Search results for: easy authentication
1381 Tourism Related Activities and Floating Garden in Inle Lake, Myanmar
Authors: Thel Phyu Phyu Soe
Abstract:
Myanmar started its new political movement in 2011, opening up to trade, encouraging foreign investment, deepening its financial sectors. The tourism is one of the key sectors to make reform process from the perspective of green economy and green growth. The Inle Lake, second largest lake, famous for broad diversity of cultural and natural assets, become one of the country’s main tourism destination. In the study area, local livelihoods are based on a combination of farming (mainly floating garden) wage labor, tourism, and small business. But the Inle lake water body or water surface area decreased by 96.44 km² within 20 years, from 67.98 km² in 1990 to 56.63 km² in 2010. Floating garden cultivation (hydro phonic farm) is a distinguished characteristic of Inle Lake. Two adjacent villages (A and B) were selected to compare the relationship between tourism access and agricultural production. Ground truthing, focus group discussion, and in-depth questionnaires with floating gardeners were carried out. In A village, 57% of the respondents relied tourism as their major income sources, while almost all the households in B village relied floating gardens as major livelihood. Both satellite image interpretation and community studies highlighted that around 80% of the floating garden become fallow after severe drought in 2010 and easy income access to tourism related activities. The villagers can get 20-30 US$ for round trip guiding to major tourist attraction places.Even though tourism is the major livelihood options for the A village, the poorest households (less than 1500 US$ per year) are those who didn’t own transportation property for tourism related activities. In B village, more than 70% of the households relied floating gardens as their major income sources and less participated in tourism related activities because they don’t have motorboat stand connected to the major tourist attraction areas. Access to tourism related activities (having boat stand where they can guide tourists by boat and sell local products and souvenirs) have much impacted on changes in local people livelihood options. However, tourism may have impacts that are beneficial for one group of a society, but which are negative for another. Income inequality and negative impacts can only be managed effectively if they have been identified, measured and evaluated. The severe drought in 2010, instability of lake water level, high expenses for agriculture assisted the local people to participate in easy access tourism related activities.Keywords: diminishing, floating garden, livelihood, tourism-related income
Procedia PDF Downloads 1291380 Quantum Dynamics for General Time-Dependent Three Coupled Oscillators
Authors: Salah Menouar, Sara Hassoul
Abstract:
The dynamic of time-dependent three coupled oscillators is studied through an approach based on decoupling of them using the unitary transformation method. From a first unitary transformation, the Hamiltonian of the complicated original system is transformed to an equal but a simple one associated with the three coupled oscillators of which masses are unity. Finally, we diagonalize the matrix representation of the transformed hamiltonian by using a unitary matrix. The diagonalized Hamiltonian is just the same as the Hamiltonian of three simple oscillators. Through these procedures, the coupled oscillatory subsystems are completely decoupled. From this uncouplement, we can develop complete dynamics of the whole system in an easy way by just examining each oscillator independently. Such a development of the mechanical theory can be done regardless of the complication of the parameters' variations.Keywords: schrödinger equation, hamiltonian, time-dependent three coupled oscillators, unitary transformation
Procedia PDF Downloads 981379 Data Mining Algorithms Analysis: Case Study of Price Predictions of Lands
Authors: Julio Albuja, David Zaldumbide
Abstract:
Data analysis is an important step before taking a decision about money. The aim of this work is to analyze the factors that influence the final price of the houses through data mining algorithms. To our best knowledge, previous work was researched just to compare results. Furthermore, before using the data of the data set, the Z-Transformation were used to standardize the data in the same range. Hence, the data was classified into two groups to visualize them in a readability format. A decision tree was built, and graphical data is displayed where clearly is easy to see the results and the factors' influence in these graphics. The definitions of these methods are described, as well as the descriptions of the results. Finally, conclusions and recommendations are presented related to the released results that our research showed making it easier to apply these algorithms using a customized data set.Keywords: algorithms, data, decision tree, transformation
Procedia PDF Downloads 3741378 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe
Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran
Abstract:
The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.Keywords: access control, multimodal biometrics, pattern recognition, security safe
Procedia PDF Downloads 3351377 Modifying Assessment Modes in the Science Classroom as a Solution to Examination Malpractice
Authors: Catherine Omole
Abstract:
Examination malpractice includes acts that temper with collecting accurate results during the conduct of an examination, thereby giving undue advantage to a student over his colleagues. Even though examination malpractice has been a lingering problem, examinations may not be easy to do away with completely as it is an important feedback tool in the learning process with several other functions e.g for the purpose of selection, placement, certification and promotion. Examination malpractice has created a lot of problems such as a relying on a weak work force based on false assessment results. The question is why is this problem still persisting, despite measures that have been taken to curb this ugly trend over the years? This opinion paper has identified modifications that could help relieve the student of the examination stress and thus increase the student’s effort towards effective learning and discourage examination malpractice in the long run.Keywords: assessment, examination malpractice, learning, science classroom
Procedia PDF Downloads 2601376 User Authentication Using Graphical Password with Sound Signature
Authors: Devi Srinivas, K. Sindhuja
Abstract:
This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.Keywords: security, graphical password, persuasive cued click points
Procedia PDF Downloads 5371375 Approximate Confidence Interval for Effect Size Base on Bootstrap Resampling Method
Authors: S. Phanyaem
Abstract:
This paper presents the confidence intervals for the effect size base on bootstrap resampling method. The meta-analytic confidence interval for effect size is proposed that are easy to compute. A Monte Carlo simulation study was conducted to compare the performance of the proposed confidence intervals with the existing confidence intervals. The best confidence interval method will have a coverage probability close to 0.95. Simulation results have shown that our proposed confidence intervals perform well in terms of coverage probability and expected length.Keywords: effect size, confidence interval, bootstrap method, resampling
Procedia PDF Downloads 5961374 Awareness and Access to Rapid Diagnostic Tests of HIV, Malaria and Tuberculosis among Rural Pregnant Women of Savannakhet Province, Lao PDR
Authors: Vanphanom Sychareun, Viengnakhone Vongxay, Kongmany Chaleunvong, Pascale Hancart Petitet
Abstract:
Background: Lao PDR still has challenges in preventing and managing health against risk of emerging and re-emerging diseases, particularly HIV/AIDS, tuberculosis and malaria among pregnant women. Community-based intervention for mothers requires more evidences on awareness of such diseases and access to rapid diagnostic tests. The study aims to determine the awareness of pregnant women regarding HIV, TB and Malaria, the access to rapid diagnostic test of such diseases among pregnant women of local community and their factors related. Method: This is a cross sectional study using quantitative approach to explore the awareness of pregnant women on HIV/AIDS/TB and Malaria in Savannakhet province, Lao PDR in three remote districts (Phin, Thapangthong and Atsaphone) of Savannakhet province. The study targeted group was pregnant women at the community level. Sample size for primary data collection of pregnant women was 189. Face-to-face administered questionnaires were applied. Descriptive and inferential statistics were applied to determine the associated factors with awareness of pregnant women on HIV/AIDS/TB and Malaria. This study is under the HEALTH project/ Expertise France. Result: Most of our participants were pregnant at 28 – 42 weeks (50.3%); ranged 4 – 38 weeks. Mean age of pregnant women was 24.3 years old (range: 14 - 48 years old); 15.9% of whom were at age below 19 years. Around 94.2% of respondents works were farming, 54.5% were illiterate, 74.0% were Mon-Kmer ethnic, and 60% had income lower than average. Only 56.6% that have access to ANC, 39.1% started the access to ANC during the first trimester and only 19.6% had visited the ANC for at least four times. Almost pregnant women (and 92.1% and 93.1%) had low to moderate knowledge of HIV and TB respectively, while three-fourth of pregnant women (74.6%) had low to moderate knowledge of malaria. Slightly higher than half of participants (53.4% and 52.9%) had easy access to HIV and TB respectively ; while 72.5% had easy access to malaria. Majority of participants knew where to get tested for malaria (73.5%) and TB (54.5%), but 73.5% did not know where to get tested for HIV. Very few pregnant women (1.6%, 2.1% and 8.5%) experienced having tested for HIV/TB/malaria. respectively. Factors associated with awareness on HIV were occupation as staff, business (OR:5.9; 95% CI:1.2-28.1), upper secondary education (OR: 14.6; 95% CI:3.1-69.2); Mone-Khmer ethnic (OR: 0.4, 95% CI: 0.2-0.8); and attending ANC more than 4 times (OR:4.1, 95%:1.7-9.7). Factors associated with awareness on TB were occupation as staff, business (OR:2.4; 95% CI: 0.7-8.0), upper secondary education (OR: 6.2; 95% CI: 1.9-20.5); Mone-Khmer ethnic (OR: 0.5, 95% CI:0.3-0.9); attending ANC more than 4 times (OR:2.8, 95%:1.2-6.4). Factors associated with awareness on malaria were upper secondary education (OR: 18.1; 95% CI: 2.3-142.9); Mone-Khmer ethnic (OR: 0.2, 95% CI:0.1-0.4); attending ANC more than 4 times (OR:3.6, 95%:1.5-8.8). Conclusion: A very low awareness on HIV, TB and malaria among pregnant women in rural community of Savannakhet triggers the requirement of comprehensive public health intervention on awareness and access to prevention against emerging diseases for all pregnant women. Future intervention should focus on providing more knowledge to pregnant women during ANC and encouraging them to attend ANC more than 4 times.Keywords: pregnant women, HIV, tuberculosis, malaria, awareness, Laos
Procedia PDF Downloads 871373 Green, Smooth and Easy Electrochemical Synthesis of N-Protected Indole Derivatives
Authors: Sarah Fahad Alajmi, Tamer Ezzat Youssef
Abstract:
Here, we report a simple method for the direct conversion of 6-Nitro-1H-indole into N-substituted indoles via electrochemical dehydrogenative reaction with halogenated reagents under strongly basic conditions through N–R bond formation. The N-protected indoles have been prepared under moderate and scalable electrolytic conditions. The conduct of the reactions was performed in a simple divided cell under constant current without oxidizing reagents or transition-metal catalysts. The synthesized products have been characterized via UV/Vis spectrophotometry, 1H-NMR, and FTIR spectroscopy. A possible reaction mechanism is discussed based on the N-protective products. This methodology could be applied to the synthesis of various biologically active N-substituted indole derivatives.Keywords: green chemistry, 1H-indole, heteroaromatic, organic electrosynthesis
Procedia PDF Downloads 1611372 Solving Momentum and Energy Equation by Using Differential Transform Techniques
Authors: Mustafa Ekici
Abstract:
Natural convection is a basic process which is important in a wide variety of practical applications. In essence, a heated fluid expands and rises from buoyancy due to decreased density. Numerous papers have been written on natural or mixed convection in vertical ducts heated on the side. These equations have been proved to be valuable tools for the modelling of many phenomena such as fluid dynamics. Finding solutions to such equations or system of equations are in general not an easy task. We propose a method, which is called differential transform method, of solving a non-linear equations and compare the results with some of the other techniques. Illustrative examples shows that the results are in good agreement.Keywords: differential transform method, momentum, energy equation, boundry value problem
Procedia PDF Downloads 4611371 Approximate Solution to Non-Linear Schrödinger Equation with Harmonic Oscillator by Elzaki Decomposition Method
Authors: Emad K. Jaradat, Ala’a Al-Faqih
Abstract:
Nonlinear Schrödinger equations are regularly experienced in numerous parts of science and designing. Varieties of analytical methods have been proposed for solving these equations. In this work, we construct an approximate solution for the nonlinear Schrodinger equations, with harmonic oscillator potential, by Elzaki Decomposition Method (EDM). To illustrate the effects of harmonic oscillator on the behavior wave function, nonlinear Schrodinger equation in one and two dimensions is provided. The results show that, it is more perfectly convenient and easy to apply the EDM in one- and two-dimensional Schrodinger equation.Keywords: non-linear Schrodinger equation, Elzaki decomposition method, harmonic oscillator, one and two-dimensional Schrodinger equation
Procedia PDF Downloads 1871370 Linear MIMO Model Identification Using an Extended Kalman Filter
Authors: Matthew C. Best
Abstract:
Linear Multi-Input Multi-Output (MIMO) dynamic models can be identified, with no a priori knowledge of model structure or order, using a new Generalised Identifying Filter (GIF). Based on an Extended Kalman Filter, the new filter identifies the model iteratively, in a continuous modal canonical form, using only input and output time histories. The filter’s self-propagating state error covariance matrix allows easy determination of convergence and conditioning, and by progressively increasing model order, the best fitting reduced-order model can be identified. The method is shown to be resistant to noise and can easily be extended to identification of smoothly nonlinear systems.Keywords: system identification, Kalman filter, linear model, MIMO, model order reduction
Procedia PDF Downloads 5941369 Layersomes for Oral Delivery of Amphotericin B
Authors: A. C. Rana, Abhinav Singh Rana
Abstract:
Layer by layer coating of biocompatible polyelectrolytes converts the liposomes into stable version i.e 'layersomes'. This system was further used to deliver the Amphotericin B through the oral route. Extensive optimization of different process variables resulted in the formation of layersomes with the particle size of 238.4±5.1, PDI of 0.24±0.16, the zeta potential of 34.6±1.3, and entrapment efficiency of 71.3±1.2. TEM analysis further confirmed the formation of spherical particles. Trehalose (10% w/w) resulted in the formation of fluffy and easy to redisperse cake in freeze dried layersomes. Controlled release up to 50 % within 24 h was observed in the case of layersomes. The layersomes were found stable in simulated biological fluids and resulted in the 3.59 fold higher bioavailability in comparison to free Amp-B. Furthermore, the developed formulation was found to be safe in comparison to Fungizone as indicated by blood urea nitrogen (BUN) and creatinine level.Keywords: amphotericin B, layersomes, liposomes, toxicity
Procedia PDF Downloads 5271368 Application of Data Mining for Aquifer Environmental Assessment
Authors: Saman Javadi, Mehdi Hashemy, Mohahammad Mahmoodi
Abstract:
Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. The common way to provide vulnerability map is DRASTIC. Meanwhile, application of the method is not easy to apply for any aquifer due to choosing appropriate constant values of weights and ranks. In this study, a new approach using k-means clustering is applied to make vulnerability maps. Four features of depth to groundwater, hydraulic conductivity, recharge value and vadose zone were considered at the same time as features of clustering. Five regions are recognized out of the case study represent zones with different level of vulnerability. The finding results show that clustering provides a realistic vulnerability map so that, Pearson’s correlation coefficients between nitrate concentrations and clustering vulnerability is obtained 61%.Keywords: clustering, data mining, groundwater, vulnerability assessment
Procedia PDF Downloads 6031367 Assessment of Psychomotor Development of Preschool Children: A Review of Eight Psychomotor Developmental Tools
Authors: Viola Hubačová Pirová
Abstract:
The assessment of psychomotor development allows us to identify children with motor delays, helps us to monitor progress in time and prepare suitable intervention programs. The foundation of psychomotor development lies in pre-school age and is crucial for child´s further cognitive and social development. Many assessment tools of psychomotor development have been developed over the years. Some of them are easy screening tools; others are more complex and sophisticated. The purpose of this review is to describe the history of psychomotor assessment, specify preschool children´s psychomotor evaluation and review eight psychomotor development assessment tools for preschool children (Denver II., DEMOST-PRE, TGMD -2/3, BOT-2, MABC-2, PDMS-2, KTK, MOT 4-6). The selection of test depends on purpose and context in which is the assessment planned.Keywords: assessment of psychomotor development, preschool children, psychomotor development, review of assessment tools
Procedia PDF Downloads 1671366 Pharmacy-Station Mobile Application
Authors: Taissir Fekih Romdhane
Abstract:
This paper proposes a mobile web application named Pharmacy-Station that sells medicines and permits user to search for medications based on their symptoms, making it is easy to locate a specific drug online without the need to visit a pharmacy where it may be out of stock. This application is developed using the jQuery Mobile framework, which uses many web technologies and languages such as HTML5, PHP, JavaScript and CSS3. To test the proposed application, we used data from popular pharmacies in Saudi Arabia that included important information such as location, contact, and medicines in stock, etc. This document describes the different steps followed to create the Pharmacy-Station application along with screenshots. Finally, based on the results, the paper concludes with recommendations and further works planned to improve the Pharmacy-Station mobile application.Keywords: pharmacy, mobile application, jquery mobile framework, search, medicine
Procedia PDF Downloads 1591365 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data
Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju
Abstract:
Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding
Procedia PDF Downloads 4121364 Investigation of Optical Requirements for Power System Assets Monitoring with Unmanned Aerial Vehicles
Authors: Ioana Pisica, Dimitrios Gkritzapis
Abstract:
The significance of UAS in scientific applications has been amply demonstrated in recent years. The combinations of portability and quasi-static positioning by means of flying in close loop path make them versatile and efficient in the inspection of power systems infrastructure. In this paper, we critically assess several platforms and sensor capabilities to identify their pros and cons in relation to the power systems assets to be monitored. In this respect, it is paramount the flights to be conducted by using UAS which bear certain suitable features, such as responsive and easy control, video capturing in real time, autonomous routing of pre-planned flight programming with differentiating payloads. The outcome of this research is a set of optimal requirements for power system assets monitoring with UAS.Keywords: platforms, power system, sensors, UAVs
Procedia PDF Downloads 2851363 Two Concurrent Convolution Neural Networks TC*CNN Model for Face Recognition Using Edge
Authors: T. Alghamdi, G. Alaghband
Abstract:
In this paper we develop a model that couples Two Concurrent Convolution Neural Network with different filters (TC*CNN) for face recognition and compare its performance to an existing sequential CNN (base model). We also test and compare the quality and performance of the models on three datasets with various levels of complexity (easy, moderate, and difficult) and show that for the most complex datasets, edges will produce the most accurate and efficient results. We further show that in such cases while Support Vector Machine (SVM) models are fast, they do not produce accurate results.Keywords: Convolution Neural Network, Edges, Face Recognition , Support Vector Machine.
Procedia PDF Downloads 1541362 Production of Alcohol from Sweet Potato
Authors: Abhishek S. Shete
Abstract:
There is nothing new in the use of alcohol made from root crops as a motor fuel. Alcohol is an excellent alternative motor fuel for petrol engines. The reason alcohol fuel has not been fully exploited is that, up until now; gasoline has been cheap, available, and easy to produce. However, nowadays, crude oil is getting scarce, and the historic price difference between alcohol and gasoline is getting narrower. Alcohol fuel can be an important part of the solution for Rwanda because there is tremendous scope to use bulk production of sweet potato into alcohol. The total sweet potato production in both seasons is found to be 1.607.296 tones/year. The average productivity of sweet potato in the country irrespective of seasons is found to be 8.9 tones/ha. If all of the available agricultural surplus were converted to ethanol, alcohol would supply less than 5% of motor fuel needs.Keywords: root crops, sweet potato, surplus, alcohol
Procedia PDF Downloads 4231361 Easy Method of Synthesis and Functionalzation of Zno Nanoparticules With 3 Aminopropylthrimethoxysilane (APTES)
Authors: Haythem Barrak, Gaetan Laroche, Adel M’nif, Ahmed Hichem Hamzaoui
Abstract:
The use of semiconductor oxides, as chemical or biological, requires their functionalization with appropriate dependent molecules of the substance to be detected. generally, the support materials used are TiO2 and SiO2. In the present work, we used zinc oxide (ZnO) known for its interesting physical properties. The synthesis of nano scale ZnO was performed by co-precipitation at low temperature (60 ° C).To our knowledge, the obtaining of this material at this temperature was carried out for the first time. This shows the low cost of this operation. On the other hand, the surface functionalization of ZnO was performed with (3-aminopropyl) triethoxysilane (APTES) by using a specific method using ethanol for the first time. In addition, the duration of this stage is very low compared to literature. The samples obtained were analyzed by XRD, TEM, DLS, FTIR, and TGA shows that XPS that the operation of grafting of APTES on our support was carried out with success.Keywords: functionalization, nanoparticle, ZnO, APTES, caractérisation
Procedia PDF Downloads 3611360 A Genetic-Neural-Network Modeling Approach for Self-Heating in GaN High Electron Mobility Transistors
Authors: Anwar Jarndal
Abstract:
In this paper, a genetic-neural-network (GNN) based large-signal model for GaN HEMTs is presented along with its parameters extraction procedure. The model is easy to construct and implement in CAD software and requires only DC and S-parameter measurements. An improved decomposition technique is used to model self-heating effect. Two GNN models are constructed to simulate isothermal drain current and power dissipation, respectively. The two model are then composed to simulate the drain current. The modeling procedure was applied to a packaged GaN-on-Si HEMT and the developed model is validated by comparing its large-signal simulation with measured data. A very good agreement between the simulation and measurement is obtained.Keywords: GaN HEMT, computer-aided design and modeling, neural networks, genetic optimization
Procedia PDF Downloads 3821359 Deformulation and Comparative Analysis of Apparently Similar Polymers Using Multiple Modes of Pyrolysis-Gc/Ms
Authors: Athena Nguyen, Rojin Belganeh
Abstract:
Detecting and identifying differences in like polymer materials are key factors in deformulation, comparative analysis as well as reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro-furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. This presentation demonstrates the study of two similar polymers by performing different mode of operations in the same system: Evolve gas analysis (EGA), Flash pyrolysis, Thermal desorption analysis, and Heart-cutting analysis. Unknown polymer materials and their chemical compositions are identified.Keywords: gas chromatography/mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS
Procedia PDF Downloads 2641358 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment
Authors: Ritsuko Kawasaki, Takeshi Hiromatsu
Abstract:
Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization
Procedia PDF Downloads 3791357 Quality Education for the Poor People: Strategy of Islamic Education in the Medium Community
Authors: Naufal Ahmad Rijalul Alam
Abstract:
This article presents a quality of education for the poor people in Indonesia and the offering of strategy to be done. It also investigates the influence of Islamic Education which stands behind the religious values in developing effort of government to respond the problem with using humanities approaches in medium society. The offering strategy resulted in four agenda: 1) building a shared commitment, 2) encouraging the improvement of the quality of public and private schools, 3) encouraging the use of 'the indicator of disaffection' for gifted children, and 4) encouraging the enlargement of vocational training centers and polytechnics. The conclusion is that the quality of education can be increased with these four agenda, although they are not too easy because it deals with other factors such as the economy, politics, and culture which is happening in the country.Keywords: quality education, poor people, strategy of Islamic education, medium community
Procedia PDF Downloads 4801356 Human Activities Recognition Based on Expert System
Authors: Malika Yaici, Soraya Aloui, Sara Semchaoui
Abstract:
Recognition of human activities from sensor data is an active research area, and the main objective is to obtain a high recognition rate. In this work, we propose a recognition system based on expert systems. The proposed system makes the recognition based on the objects, object states, and gestures, taking into account the context (the location of the objects and of the person performing the activity, the duration of the elementary actions, and the activity). This work focuses on complex activities which are decomposed into simple easy to recognize activities. The proposed method can be applied to any type of activity. The simulation results show the robustness of our system and its speed of decision.Keywords: human activity recognition, ubiquitous computing, context-awareness, expert system
Procedia PDF Downloads 1401355 Engineering the Human Mind: Social Engineering Attack Using Kali Linux
Authors: Joy Winston James, Abdul Kadher Jilani
Abstract:
This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.Keywords: pen testing, hacking, Kali Linux, social engineering
Procedia PDF Downloads 991354 Phenotypic and Symbiotic Characterization of Rhizobia Isolated from Faba Bean (Vicia faba L.) in Moroccan Soils
Authors: Y. Hajjam, I. T. Alami, S. M. Udupa, S. Cherkaoui
Abstract:
Faba bean (Vicia faba L.) is an important food legume crop in Morocco. It is mainly used as human food and feed for animals. Faba bean also plays an important role in cereal-based cropping systems, when rotated with cereals it improves soil fertility by fixing N2 in root nodules mediated by Rhizobium. Both faba bean and its biological nitrogen fixation symbiotic bacterium Rhizobium are affected by different stresses such as: salinity, drought, pH, heavy metal, and the uptake of inorganic phosphate compounds. Therefore, the aim of the present study was to evaluate the phenotypic diversity among the faba bean rhizobial isolates and to select the tolerant strains that can fix N2 under environmental constraints for inoculation particularly for affected soils, in order to enhance the productivity of faba bean and to improve soil fertility. Result have shown that 62% of isolates were fast growing with the ability of producing acids compounds , while 38% of isolates are slow growing with production of alkalins. Moreover, 42.5% of these isolates were able to solubilize inorganic phosphate Ca3(PO4)2 and the index of solubilization was ranged from 2.1 to 3.0. The resistance to extreme pH, temperature, water stress heavy metals and antibiotics lead us to classify rhizobial isolates into different clusters. Finally, the authentication test under greenhouse conditions showed that 55% of the rhizobial isolates could induce nodule formation on faba bean (Vicia faba L.) under greenhouse experiment. This phenotypic characterization may contribute to improve legumes and non legumes crops especially in affected soils and also to increase agronomic yield in the dry areas.Keywords: rhizobia, vicia faba, phenotypic characterization, nodule formation, environmental constraints
Procedia PDF Downloads 2521353 Application of Neural Petri Net to Electric Control System Fault Diagnosis
Authors: Sadiq J. Abou-Loukh
Abstract:
The present work deals with implementation of Petri nets, which own the perfect ability of modeling, are used to establish a fault diagnosis model. Fault diagnosis of a control system received considerable attention in the last decades. The formalism of representing neural networks based on Petri nets has been presented. Neural Petri Net (NPN) reasoning model is investigated and developed for the fault diagnosis process of electric control system. The proposed NPN has the characteristics of easy establishment and high efficiency, and fault status within the system can be described clearly when compared with traditional testing methods. The proposed system is tested and the simulation results are given. The implementation explains the advantages of using NPN method and can be used as a guide for different online applications.Keywords: petri net, neural petri net, electric control system, fault diagnosis
Procedia PDF Downloads 4751352 Towards Developing a Self-Explanatory Scheduling System Based on a Hybrid Approach
Authors: Jian Zheng, Yoshiyasu Takahashi, Yuichi Kobayashi, Tatsuhiro Sato
Abstract:
In the study, we present a conceptual framework for developing a scheduling system that can generate self-explanatory and easy-understanding schedules. To this end, a user interface is conceived to help planners record factors that are considered crucial in scheduling, as well as internal and external sources relating to such factors. A hybrid approach combining machine learning and constraint programming is developed to generate schedules and the corresponding factors, and accordingly display them on the user interface. Effects of the proposed system on scheduling are discussed, and it is expected that scheduling efficiency and system understandability will be improved, compared with previous scheduling systems.Keywords: constraint programming, factors considered in scheduling, machine learning, scheduling system
Procedia PDF Downloads 324