Search results for: security and protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4796

Search results for: security and protection

1826 Ecological Effect on Aphid Population in Safflower Crop

Authors: Jan M. Mari

Abstract:

Safflower is a renowned drought tolerant oil seed crop. Previously its flowers were used for cooking and herbal medicines in China and it was cultivated by small growers for his personal needs of oil. A field study was conducted at experimental field, faculty of crop protection, Sindh Agricultural University Tandojam, during winter, 2012-13, to observe ecological effect on aphid population in safflower crop. Aphid population gradually increased with the growth of safflower. It developed with maximum aphid per leaf on 3rd week of February and it decreased in March as crop matured. A non-significant interaction was found with temperature of aphid, zigzag and hoverfly, respectively and a highly significant interaction with temperature was found with 7-spotted, lacewing, 9-spotted, and Brumus, respectively. The data revealed the overall mean population of zigzag was highest, followed by 9-spotted, 7-spotted, lace wing, hover fly and Brumus, respectively. In initial time the predator and prey ratio indicated that there was not a big difference between predator and prey ratio. After January 1st, the population of aphid increased suddenly until 18th February and it established a significant difference between predator prey ratios. After that aphid population started decreasing and it affected ratio between pest and predators. It is concluded that biotic factors, 7-spotted, zigzag, 9-spotted Brumus and lacewing exhibited a strong and positive correlation with aphid population. It is suggested that aphid pest should be monitored regularly and before reaching economic threshold level augmentation of natural enemies may be managed.

Keywords: aphid, ecology, population, safflower

Procedia PDF Downloads 258
1825 Constructions of Linear and Robust Codes Based on Wavelet Decompositions

Authors: Alla Levina, Sergey Taranov

Abstract:

The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.

Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability

Procedia PDF Downloads 485
1824 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 215
1823 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic

Authors: Muhammad Luqman, Yusuf Kurniawan

Abstract:

S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.

Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process

Procedia PDF Downloads 360
1822 Livelihood Security and Mitigating Climate Changes in the Barind Tract of Bangladesh through Agroforestry Systems

Authors: Md Shafiqul Bari, Md Shafiqul Islam Sikdar

Abstract:

This paper summarizes the current knowledge on Agroforestry practices in the Barind tract of Bangladesh. The part of greater Rajshahi, Dinajpur, Rangpur and Bogra district of Bangladesh is geographically identified as the Barind tract. The hard red soil of these areas is very significant in comparison to that of the other parts of the country. A typical dry climate with comparatively high temperature prevails in the Barind area. Scanty rainfall and excessive extraction of groundwater have created an alarming situation among the Barind people and others about irrigation to the rice field. In addition, the situation may cause an adverse impact on the people whose livelihood largely depends on agriculture. The groundwater table has been declined by at least 10 to 15 meters in some areas of the Barind tract during the last 20 years. Due to absent of forestland in the Barind tract, the soil organic carbon content can decrease more rapidly because of the higher rate of decomposition. The Barind soils are largely carbon depleted but can be brought back to carbon-carrying capacity by bringing under suitable Agroforestry systems. Agroforestry has tremendous potential for carbon sequestration not only in above C biomass but also root C biomass in deeper soil depths. Agroforestry systems habitually conserve soil organic carbon and maintain a great natural nutrient pool. Cultivation of trees with arable crops under Agroforestry systems help in improving soil organic carbon content and sequestration carbon, particularly in the highly degraded Barind lands. Agroforestry systems are a way of securing the growth of cash crops that may constitute an alternative source of income in moments of crisis. Besides being a source of fuel wood, a greater presence of trees in cropping system contributes to decreasing temperatures and to increasing rainfall, thus contrasting the negative environmental impact of climate changes. In order to fulfill the objectives of this study, two experiments were conducted. The first experiment was survey on the impact of existing agroforestry system on the livelihood security in the Barind tract of Bangladesh and the second one was the role of agroforestry system on the improvement of soil properties in a multilayered coconut orchard. Agroforestry systems have been generated a lot of employment opportunities in the Barind area. More crops mean involvement of more people in various activities like involvements in dairying, sericulture, apiculture and additional associated agro-based interventions. Successful adoption of Agroforestry practices in the Barind area has shown that the Agroforestry practitioners of this area were very sound positioned economically, and had added social status too. However, from the findings of the present study, it may be concluded that the majority rural farmers of the Barind tract of Bangladesh had a very good knowledge and medium extension contact related to agroforestry production system. It was also observed that 85 per cent farmers followed agroforestry production system and received benefits to a higher extent. Again, from the research study on orchard based mutistoried agroforestry cropping system, it was evident that there was an important effect of agroforestry cropping systems on the improvement of soil chemical properties. As a result, the agroforestry systems may be helpful to attain the development objectives and preserve the biosphere core.

Keywords: agroforestry systems, Barind tract, carbon sequestration, climate changes

Procedia PDF Downloads 194
1821 The Justice of Resources Allocation for People with Disability Base on Activity and Participation Functioning: The Cross-Section Study of National Population

Authors: Chia-Feng Yen, Shyang-Woei Lin

Abstract:

Background: In Taiwan, people with disability can obtain national social welfare services after evaluation. All subsidies and services in- kind are pronounced in People with Disabilities Rights Protection Act. The new disability eligibility determination system base on ICF has carried out five years in Taiwan. There were no systematic outcomes to discuss the relationships between the evaluation results of activity and participation functioning (AP functioning) and ratification of social services for people with disability. The decision-making of welfare resources allocation is in local government, so the ratification could be affected by resource variations in every area (local governments). The purposes of this study are to compare the ratification rate between different areas (the equity of allocation), and to understand the ratification of social services for people with disability after needs assessment stage that can help to predict the resources allocation for local governments in the further. Methods: A cross-sectional study was used, and the data came from Disability Eligibility Determination System in Taiwan between 2013/11/04-2015/01/12. All samples were evaluated by FUNDES-adult version 7th and they all above 18 years old. The samples were collected face to face by physicians and AP evaluators. Result: In the needs assessment stage, the welfare ratification rates are significant differences between these local governments for the samples with the similar impairment and AP functioning.

Keywords: allocation, activity and participation, people with disability, justice

Procedia PDF Downloads 159
1820 Traditional Knowledge on Living Fences in Andean Linear Plantations

Authors: German Marino Rivera

Abstract:

Linear plantations are a common practice in several countries as living fences (LF) delimiting agroecosystems. They are composed of multipurpose perennial woods that provide assets, protection, and supply services. However, not much is known in some traditional communities like the Andean region, including the species composition and the social and ecological benefits of the species used. In the High Andean Colombian region, LF seems to be very typical and diverse. This study aimed to analyze the traditional knowledge about LF systems, including the species composition and their uses in rural communities of Alto Casanare, Colombia. Field measurements, interviews, guided tours, and species sampling were carried out in order to describe traditional practices and the species used in the LF systems. The use values were estimated through the Coefficient of Importance of the Species (CIS). A total of 26 farms engage in LF practices, covering an area of 9283.3 m. In these systems, 30 species were identified, belonging to 23 families. Alnus acuminata was the specie with the highest CIS. The species presented multipurpose uses for both economic and ecological purposes. The transmission of knowledge (TEK) about the used species is very heterogeneous among the farmers. Many species used were not documented, with reciprocal gaps between the literature and traditional species uses. Exchanging this information would increase the species' versatility, the socioeconomic aspects of these communities, increases the agrobiodiversity and ecological services provided by LF. The description of the TEK on LF provides a better understanding of the relationship of these communities with the natural resources, pointing out creative approaches to achieve local environment conservation in these agroecosystems and promoting socioeconomic development.

Keywords: ethnobotany, living fences, traditional communities, agroecology

Procedia PDF Downloads 86
1819 Evaluation of Monumental Trees in Bursa City in Terms of Cultural Landscape

Authors: Murat Zencirkiran, Nilufer Seyidoglu Akdeniz, Elvan Ender Altay, Zeynep Pirselimoglu Batman

Abstract:

Monumental trees make an important contribution to the cultural interaction between societies. At the same time, monument trees, which are considered as symbols of some beliefs, are living beings that are transmitted from generation to generation. Mystical, folkloric and dimensional aspects of our cultural heritage and the link between the past and present, the memorial trees of the generations of the stories conveyed the story of the legends at the same time with the aesthetic features of the objects attract attention. There are many monumental trees that witness historical processes in Bursa, which is a land of very different cultures from the Prusias (BC 232-192). Within this scope, monumental trees located within the boundaries of Bursa province and their contribution to urban culture were evaluated. Monument plane trees recorded in Bursa and its districts were determined by the Ministry of Environment and Urbanization, the Governorship of Bursa, the Provincial Directorate of Environment and Urbanism, the Directorate of Protection of Natural Assets, and these trees were examined in situ. As a result of the inspections made, the monument trees living today are classified according to their species. Within the scope of the study, it was determined that there were 1001 monumental tree species in different species within the boundaries of Bursa province. 71.83% of the recorded species were Platanus species and 11.79% were Pinus species. On the other hand, the stories about the contribution of cultural landscapes to the examples of living or now-disappearing examples of Bursa history from these monumental trees have been compiled and presented in the study.

Keywords: Bursa, cultural landscape, landscape, monumental trees

Procedia PDF Downloads 422
1818 Restoration Process of Kastamonu - Tufekciler Village Houses for Potential Eco-Tourism Purposes

Authors: Turkan Sultan Yasar Ismail, Mehmet Cetin, M. Danial Ismail, Hakan Sevik

Abstract:

Nowadays, there is a need for the real world to be translated to the virtual environment by three-dimensional visualisation for restoration and promotional modelling of historic sites in protected areas. Visualisation models have also become the very important basis for the creation of three-dimensional Geographic Information System. The protection of historical and cultural heritage and documenting in Turkey as well as all over the world is an important issue. This heritage is a bridge between the past and the future of humanity. Many historical and cultural heritages suffer neglect and for reasons arising from natural causes. This is to determine the current status of the work and documenting information from the selected buildings. This process is important for their conservation and renovation work that might be done in the future. Kastamonu city is one of the historical cities in Turkey with a number of heritage buildings. However, Tufekciler Village is not visited and famous even though it includes several historical buildings and peaceful landscape. Digital terrestrial photogrammetry is one of the most important methods used in the documentation of cultural and historical heritage. Firstly, measurements were made primarily around creating polygon mesh and 3D model drawings of the structures to be modelled on images with the move to digital media such as picture size and by subsequent visualisation process. Secondly, a restoration project is offered to the village with the concept of eco-tourism with all scales such as, interior space to landscape design.

Keywords: eco-tourism, restoration, sustainability, cultural village

Procedia PDF Downloads 341
1817 Solid Waste Management Challenges and Possible Solution in Kabul City

Authors: Ghulam Haider Haidaree, Nsenda Lukumwena

Abstract:

Most developing nations face energy production and supply problems. This is also the case of Afghanistan whose generating capacity does not meet its energy demand. This is due in part to high security and risk caused by war which deters foreign investments and insufficient internal revenue. To address the issue above, this paper would like to suggest an alternative and affordable way to deal with the energy problem. That is by converting Solid Waste to energy. As a result, this approach tackles the municipal solid waste issue (potential cause of several diseases), contributes to the improvement of the quality of life, local economy, and so on. While addressing the solid waste problem in general, this paper samples specifically one municipality which is District-12, one of the 22 districts of Kabul city. Using geographic information system (GIS) technology, District-12 is divided into nine different zones whose municipal solid waste is respectively collected, processed, and converted into electricity and distributed to the closest area. It is important to mention that GIS has been used to estimate the amount of electricity to be distributed and to optimally position the production plant.

Keywords: energy problem, estimation of electricity, GIS zones, solid waste management system

Procedia PDF Downloads 327
1816 Information System Development for Online Journal System Using Online Journal System for Journal Management of Suan Sunandha Rajabhat University

Authors: Anuphan Suttimarn, Natcha Wattanaprapa, Suwaree Yordchim

Abstract:

The aim of this study is to develop the online journal system using a web application to manage the journal service of Suan Sunandha Rajabhat University in order to improve the journal management of the university. The main structures of the system process consist of 1. journal content management system 2. membership system of the journal and 3. online submission or review process. The investigators developed the system based on a web application using open source OJS software and phpMyAdmin to manage a research database. The system test showed that this online system 'Online Journal System (OJS)' could shorten the time in the period of submission article to journal and helped in managing a journal procedure efficiently and accurately. The quality evaluation of Suan Sunandha Rajabhat online journal system (SSRUOJS) undertaken by experts and researchers in 5 aspects; design, usability, security, reducing time, and accuracy showed the highest average value (X=4.30) on the aspect of reducing time. Meanwhile, the system efficiency evaluation was on an excellent level (X=4.13).

Keywords: online journal system, Journal management, Information system development, OJS

Procedia PDF Downloads 171
1815 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields

Authors: Okoro Ikechukwu Ralph, Fuat Kara

Abstract:

The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.

Keywords: offshore reliability, production performance, subsea control module, well integrity

Procedia PDF Downloads 503
1814 SkyCar Rapid Transit System: An Integrated Approach of Modern Transportation Solutions in the New Queen Elizabeth Quay, Perth, Western Australia

Authors: Arfanara Najnin, Michael W. Roach, Jr., Dr. Jianhong Cecilia Xia

Abstract:

The SkyCar Rapid Transit System (SRT) is an innovative intelligent transport system for the sustainable urban transport system. This system will increase the urban area network connectivity and decrease urban area traffic congestion. The SRT system is designed as a suspended Personal Rapid Transit (PRT) system that travels under a guideway 5m above the ground. A driver-less passenger is via pod-cars that hang from slender beams supported by columns that replace existing lamp posts. The beams are setup in a series of interconnecting loops providing non-stop travel from beginning to end to assure journey time. The SRT forward movement is effected by magnetic motors built into the guideway. Passenger stops are at either at line level 5m above the ground or ground level via a spur guideway that curves off the main thoroughfare. The main objective of this paper is to propose an integrated Automated Transit Network (ATN) technology for the future intelligent transport system in the urban built environment. To fulfil the objective a 4D simulated model in the urban built environment has been proposed by using the concept of SRT-ATN system. The methodology for the design, construction and testing parameters of a Technology Demonstrator (TD) for proof of concept and a Simulator (S) has been demonstrated. The completed TD and S will provide an excellent proving ground for the next development stage, the SRT Prototype (PT) and Pilot System (PS). This paper covered by a 4D simulated model in the virtual built environment is to effectively show how the SRT-ATN system works. OpenSim software has been used to develop the model in a virtual environment, and the scenario has been simulated to understand and visualize the proposed SkyCar Rapid Transit Network model. The SkyCar system will be fabricated in a modular form which is easily transported. The system would be installed in increasingly congested city centers throughout the world, as well as in airports, tourist resorts, race tracks and other special purpose for the urban community. This paper shares the lessons learnt from the proposed innovation and provides recommendations on how to improve the future transport system in urban built environment. Safety and security of passengers are prime factors to be considered for this transit system. Design requirements to meet the safety needs to be part of the research and development phase of the project. Operational safety aspects would also be developed during this period. The vehicles, the track and beam systems and stations are the main components that need to be examined in detail for safety and security of patrons. Measures will also be required to protect columns adjoining intersections from errant vehicles in vehicular traffic collisions. The SkyCar Rapid Transit takes advantage of all current disruptive technologies; batteries, sensors and 4G/5G communication and solar energy technologies which will continue to reduce the costs and make the systems more profitable. SkyCar's energy consumption is extremely low compared to other transport systems.

Keywords: SkyCar, rapid transit, Intelligent Transport System (ITS), Automated Transit Network (ATN), urban built environment, 4D Visualization, smart city

Procedia PDF Downloads 209
1813 Deciphering the Gut Microbiome's Role in Early-Life Immune Development

Authors: Xia Huo

Abstract:

Children are more vulnerable to environmental toxicants compared to adults, and their developing immune system is among the most sensitive targets regarding toxicity of environmental toxicants. Studies have found that exposure to environmental toxicants is associated with impaired immune function in children, but only a few studies have focused on the relationship between environmental toxicant exposure and vaccine antibody potency and immunoglobulin (Ig) levels in children. These studies investigated the associations of exposure to polychlorinated biphenyls (PCBs), perfluorinated compounds (PFCs), heavy metals (Pb, Cd, As, Hg) and PM2.5 with the serum-specific antibody concentrations and Ig levels against different vaccines, such as anti-Hib, tetanus, diphtheria toxoid, and analyze the possible mechanisms underlying exposure-related alterations of antibody titers and Ig levels against different vaccines. Results suggest that exposure to these toxicants is generally associated with decreased potency of antibodies produced from childhood immunizations and an overall deficiency in the protection the vaccines provide. Toxicant exposure is associated with vaccination failure and decreased antibody titers, and increased risk of immune-related diseases in children by altering specific immunoglobulin levels. Age, sex, nutritional status, and co-exposure may influence the effects of toxicants on the immune function in children. Epidemiological evidence suggests that exposure-induced changes to humoral immunerelated tissue/cells/molecules response to vaccines may have predominant roles in the inverse associations between antibody responsiveness to vaccines and environmental toxicants. These results help us to conduct better immunization policies for children under environmental toxicant burden.

Keywords: environmental toxicants, immunotoxicity, vaccination, antibodies, children's health

Procedia PDF Downloads 52
1812 Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector

Authors: Ahmed Al-Adaileh, Souheil Khaddaj

Abstract:

Outcomes of exhaustion of natural resources started influencing each spirit on this planet. Energy is an essential factor in this aspect. To restore the circumstance to the appropriate track, all attempts must focus on two fundamental branches: producing electricity from clean and renewable reserves and decreasing the overall unnecessary consumption of energy. The focal point of this paper will be on lessening the power consumption in the household's segment. This paper is an attempt to give a clear understanding of a framework called Reduction of Energy Consumption in Household Sector (RECHS) and how it should help householders to reduce their power consumption by substituting their household appliances, turning-off the appliances when stand-by modus is detected, and scheduling their appliances operation periods. Technically, the framework depends on utilizing Z-Wave compatible plug-ins which will be connected to the usual house devices to gauge and control them remotely and semi-automatically. The suggested framework underpins numerous quality characteristics, for example, integrability, scalability, security and adaptability.

Keywords: smart energy management systems, internet of things, wireless mesh networks, microservices, cloud computing, big data

Procedia PDF Downloads 186
1811 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 258
1810 Sustainable Project Management Necessarily Implemented in the Chinese Wine Market Due to Climate Variation

Authors: Ruixin Zhang, Joel Carboni, Songchenchen Gong

Abstract:

Since the Sustainable Development Goals (SDGs) officially became the 17 development goals set by the United Nations in 2015, it has become an inevitable trend in project management development globally. Since Sustainability and glob-alization are the main focus and trends in the 21st century, project management contains system-based optimization, and or-ganizational humanities, environmental protection, and economic development. As a populous country globally, with the advanced development of economy and technology, China becomes one of the biggest markets in the wine industry. However, the develop-ment of society also brings specific environmental issues. Climate changes have already brought severe impacts on the Chinese wine market, including consumer behavior, wine production activities, and organizational humanities. Therefore, the implementation of sustainable project management in Chinese wine market is essential. Surveys based analysis is the primary method to interpret how the climate variation effect the Chinese wine market and the importance of sustainable project management implementation for green market growth in China. This paper proposes the CWW Conceptual model that can be used in the wine industry, the new 7 Drivers Model, and SPM Framework to interpret the main drivers that impact project management implementation in the wine industry and to offer the directions to wine companies in China which would help them to achieve the green growth.

Keywords: project management, sustainability, green growth, climate changes, Chinese wine market

Procedia PDF Downloads 121
1809 Torture, Inhuman and Degrading Treatment in Nigeria: A Time for Legislative Intervention

Authors: Kolawole Oyekan

Abstract:

Torture, cruel, inhuman and degrading treatment is one of the issues dealt with by the United Nations in its development of human rights standard. Torture and other ill -treatments is banned at all times in all places including in times of war. There is no justification for torture, cruel, inhuman and degrading treatment under any law in Nigeria. All statutes; local, regional and international on human rights prohibits all forms of degrading treatment. This paper examines the definition of torture, inhuman and degrading treatment and the prevalence of confessional statements obtain through torture by security agencies during the interrogation of crime suspects and are mostly relied upon during trial even in cases involving capital punishment. The paper further reviews the Violence against Persons Prohibition Act 2015 which prohibits torture and other forms of ill-treatment. Presently, the Act is applicable only to the federal Federal Capital Territory, Abuja. Consequently, the paper concludes that the Act should be adopted as a matter of urgency by the 36 states of the Federation of Nigeria and in addition, cogent steps must be taken to ensure that the provisions of the Act are strictly complied with in order to eliminate torture, cruel and inhuman degrading treatment in Nigeria.

Keywords: confessional statement, human rights, torture, United Nations

Procedia PDF Downloads 301
1808 Impact of Climate on Productivity of Major Cereal Crops in Sokoto State, Nigeria

Authors: M. B. Sokoto, L. Tanko, Y. M. Abdullahi

Abstract:

The study aimed at examining the impact of climatic factors (rainfall, minimum and maximum temperature) on the productivity of major cereals in Sokoto state, Nigeria. Secondary data from 1997-2008 were used in respect of annual yield of Major cereals crops (maize, millet, rice, and sorghum (t ha-1). Data in respect of climate was collected from Sokoto Energy Research Centre (SERC) for the period under review. Data collected was analyzed using descriptive statistics, correlation and regression analysis. The result of the research reveals that there is variation in the trend of the climatic factors and also variation in cereals output. The effect of average temperature on yields has a negative effect on crop yields. Similarly, rainfall is not significant in explaining the effect of climate on cereal crops production. The study has revealed to some extend the effect of climatic variables, such as rainfall, relative humidity, maximum and minimum temperature on major cereals production in Sokoto State. This will assist in planning ahead in cereals production in the area. Other factors such as soil fertility, correct timing of planting and good cultural practices (such as spacing of strands), protection of crops from weeds, pests and diseases and planting of high yielding varieties should also be taken into consideration for increase yield of cereals.

Keywords: cereals, climate, impact, major, productivity

Procedia PDF Downloads 386
1807 Non-Contact Human Movement Monitoring Technique for Security Control System Based 2n Electrostatic Induction

Authors: Koichi Kurita

Abstract:

In this study, an effective non-contact technique for the detection of human physical activity is proposed. The technique is based on detecting the electrostatic induction current generated by the walking motion under non-contact and non-attached conditions. A theoretical model for the electrostatic induction current generated because of a change in the electric potential of the human body is proposed. By comparing the obtained electrostatic induction current with the theoretical model, it becomes obvious that this model effectively explains the behavior of the waveform of the electrostatic induction current. The normal walking motions are recorded using a portable sensor measurement located in a passageway of office building. The obtained results show that detailed information regarding physical activity such as a walking cycle can be estimated using our proposed technique. This suggests that the proposed technique which is based on the detection of the walking signal, can be successfully applied to the detection of human walking motion in a secured building.

Keywords: human walking motion, access control, electrostatic induction, alarm monitoring

Procedia PDF Downloads 355
1806 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 345
1805 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 183
1804 Polish Operational Plans During Cold War as Part of Warsaw Pact Strategic Culture

Authors: Wiktor Stypczyński

Abstract:

During the Cold War, both sides of the conflict developed advanced operational plans in case of a Third World War outbreak. In the Warsaw Pact, Soviet generals in Moscow chose targets for each army, but each country's General Staff had to create specific plans for their nation. This led to the creation of a Strategic Culture within the Warsaw Pact that was reflected in the plans of each army. This paper aims to showcase the Strategic Culture of the Warsaw Pact by using the plans of the People's Polish Army as an example. Examining one army at a time will allow for a more detailed and unique perspective on the matter. Understanding the past Strategic Culture is crucial in comprehending the current post-Soviet strategic situation in Eastern Europe, especially with the current situation in Ukraine. This paper is based on Benon Miśkiewicz's classic methodology of military history. While this methodology is the foundation, the research findings will also draw on the Strategic Studies methodology and the accomplishments of war and military science. Additionally, the Security and Political Studies methodology will be a crucial element in constructing the narrative.

Keywords: cold war, operetional plans, strategic culture, polish people's army

Procedia PDF Downloads 64
1803 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 338
1802 Investigation of Water Absorption and Compressive Strength of Resin Coated Mortar

Authors: Yasir Ali, Zain Ul Abdin, Muhammad Wisal Khattak

Abstract:

Nowadays various advanced techniques are used to enhance the performance of materials in the field of construction engineering. Structures exposed to an aggressive, humid and hostile environment are experiencing severe negative impacts which lead to premature failure. Polyester resin is one of the advanced material used for improving performance of structural materials especially for repair/ refurbish purpose of structures and protection from contaminated environmental effect/ hazards. This study investigated the aptness of the polyester resin as coating agent on the mortar and assessed its performance in an ambient environment of Pakistan. Cubical specimens of mortar were fabricated. These specimens were tested for water absorption and compressive strength after one day and sixty days. These tests were performed under different exposure conditions (ambient environment and submerged in water). The specimens were coated with one, two and three layers and results were compared to control (no/ zero resin layer) specimens. Test results indicated that there is a significant decrease in water absorption of mortar coated with resin when compared to controlled specimens. The compressive strength test results revealed that resin coated specimen had higher strength when compared to controlled specimens. The results suggested that resin is a promising material and can be used effectively in structures which are exposed to high temperatures. The study would be helpful in improving performance of the structural material in a hazardous environment.

Keywords: ambient environment, coating, mortar, polyester resin

Procedia PDF Downloads 353
1801 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 116
1800 Materialized View Effect on Query Performance

Authors: Yusuf Ziya Ayık, Ferhat Kahveci

Abstract:

Currently, database management systems have various tools such as backup and maintenance, and also provide statistical information such as resource usage and security. In terms of query performance, this paper covers query optimization, views, indexed tables, pre-computation materialized view, query performance analysis in which query plan alternatives can be created and the least costly one selected to optimize a query. Indexes and views can be created for related table columns. The literature review of this study showed that, in the course of time, despite the growing capabilities of the database management system, only database administrators are aware of the need for dealing with archival and transactional data types differently. These data may be constantly changing data used in everyday life, and also may be from the completed questionnaire whose data input was completed. For both types of data, the database uses its capabilities; but as shown in the findings section, instead of repeating similar heavy calculations which are carrying out same results with the same query over a survey results, using materialized view results can be in a more simple way. In this study, this performance difference was observed quantitatively considering the cost of the query.

Keywords: cost of query, database management systems, materialized view, query performance

Procedia PDF Downloads 273
1799 Partial Replacement of GGBS in Concrete for Prevention of Natural Resources

Authors: M. Murmu, Govardhan, J. Satya Eswari

Abstract:

Concrete is the most common and widely used building material. Concrete is basically made of aggregates, both fine and coarse, glued by a cement paste which is made of cement and water. Each one of these constituents of concrete has a negative environmental impact and gives rise to different sustainability issues. The current concrete construction practice is unsustainable because, not only it consumes enormous quantities of stones, sand, and drinking water, but also one billion tons a year of cement, which is not an environment friendly material. Preventing the reduction of natural resources and enhancing the usage of waste materials has become a challenge to the scientist and engineers. A number of studies have been conducted concerning the protection of natural resources, prevention of environmental pollution and contribution to the economy by using this waste material. This paper outlines the influence of Ground Granulated Blast furnace Slag (GGBS) as partial replacement of fine aggregate on mechanical properties of concrete. The strength of concrete is determined having OPC binder, replaced the fine aggregate with15%, 30%, 45% respectively. For this purpose, characteristics concrete mix of M25 with partial replacement of cement with GGBS is used and the strength of concrete cubes and cylinder have determined. The strength of concrete specimens has been compared with the reference specimen. Also X-ray diffraction (XRD) and scanning electron microscope (SEM) tests have been performed to examine the hydration products and the microstructure of the tested specimens. A correlation has been established between the developmental strength concrete with and without GGBS through analysis of hydration products and the microstructure.

Keywords: GGBS, sand, concrete, workability

Procedia PDF Downloads 498
1798 Investigating the Properties of Asphalt Concrete Containing Recycled Fillers

Authors: Hasan Taherkhani

Abstract:

Increasingly accumulation of the solid waste materials has become a major environmental problem of communities. In addition to the protection of environment, the recycling and reusing of the waste materials are financially beneficial. Waste materials can be used in highway construction. This study aimed to investigate the applicability of recycled concrete, asphalt and steel slag powder, as a replacement of the primary mineral filler in asphalt concrete has been investigated. The primary natural siliceous aggregate filler, as control, has been replaced with the secondary recycled concrete, asphalt and steel slag powders, and some engineering properties of the mixtures have been evaluated. Marshal Stability, flow, indirect tensile strength, moisture damage, static creep and volumetric properties of the mixtures have been evaluated. The results show that, the Marshal Stability of the mixtures containing recycled powders is higher than that of the control mixture. The flow of the mixtures containing recycled steel slag is lower, and that of the mixtures containing recycled asphalt and cement concrete powder is found to be higher than that of the control mixture. It is also found that the resistance against moisture damage and permanent deformation of the mixture can be improved by replacing the natural filler with the recycled powders. The volumetric properties of the mixtures are not significantly influenced by replacing the natural filler with the recycled powders.

Keywords: filler, steel slag, recycled concrete, recycled asphalt concrete, tensile strength, moisture damage, creep

Procedia PDF Downloads 274
1797 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities

Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan

Abstract:

The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.

Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility

Procedia PDF Downloads 70