Search results for: web application vulnerabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8332

Search results for: web application vulnerabilities

7942 An Analysis and Design of Mobile Payment System Based on NFC Technology

Authors: Shafiq ur Rehman, Zubair Ahmed Shaikh

Abstract:

This research provides the comparative study of different mobile payment system and proposes an efficient solution of mobile payment system. The research involves discovering how the mobile payment methods can be used and implemented keeping user and system interaction under consideration. The implementation of Nielsen’s heuristic and universal design principles enhanced the user’s interaction design and made the system more appropriate, understandable and visible to the end user. The design of application is greatly affected by the user driven factors. These factors help in the efficiency of the application usage.

Keywords: mobile payment system, m-commerce, usability, near field communication

Procedia PDF Downloads 446
7941 Determination of Metalaxyl Efficacy in Controlling Phytophthora palmivora Infection of Durian Using Bioassay

Authors: Supawadee Phetkhajone, Wisuwat Songnuan

Abstract:

Metalaxyl is one of the most common and effective fungicides used to control Phytophthora palmivora infection in durian (Durio zibethinus L.). The efficacy of metalaxyl residue in durian under greenhouse condition was evaluated using bioassay. Durian seedlings were treated with 2 methods of application, spraying, and soil drenching of metalaxyl, at recommended concentration (1000 mg/L). Mock treated samples were treated with 0.1% Tween20 and water for spraying and soil drenching methods, respectively. The experiment was performed in triplicates. Leaves were detached from treated plants at 0, 1, 7, 15, 20, 30, and 60 days after application, inoculated with metalaxyl-resistant and metalaxyl-sensitive isolates of P. palmivora, and incubated in a high humidity chamber for 5 days at room temperature. Metalaxyl efficacy was determined by measuring the lesion size on metalaxyl treated and mock treated samples. The results showed that metalaxyl can control metalaxyl-sensitive isolate of P. palmivora for at least 30 days after application in both methods of application. The metalaxyl-resistant isolate was not inhibited in all treatments. Leaf samples from spraying method showed larger lesions compared to soil drench method. These results demonstrated that metalaxyl applications, especially soil drenching methods showed high efficacy to control metalaxyl-sensitive isolates of P. palmivora, although it cannot control metalaxyl-resistant isolates of P. palmivora in all treatments. These qualitative data indicate that metalaxyl may suitable to control metalaxyl-sensitive isolates of P. palmivora infection.

Keywords: bioassay, degradation, durian, metalaxyl

Procedia PDF Downloads 121
7940 Source Separation for Global Multispectral Satellite Images Indexing

Authors: Aymen Bouzid, Jihen Ben Smida

Abstract:

In this paper, we propose to prove the importance of the application of blind source separation methods on remote sensing data in order to index multispectral images. The proposed method starts with Gabor Filtering and the application of a Blind Source Separation to get a more effective representation of the information contained on the observation images. After that, a feature vector is extracted from each image in order to index them. Experimental results show the superior performance of this approach.

Keywords: blind source separation, content based image retrieval, feature extraction multispectral, satellite images

Procedia PDF Downloads 397
7939 Coronavirus Academic Paper Sorting Application

Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh

Abstract:

The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.

Keywords: COVID-19, literature summary, information retrieval, Snorkel

Procedia PDF Downloads 148
7938 An Analysis of OpenSim Graphical User Interface Effectiveness

Authors: Sina Saadati

Abstract:

OpenSim is a well-known software in biomechanical studies. There are worthy algorithms developed in this program which are used for modeling and simulation of human motions. In this research, we analyze the OpenSim application from the computer science perspective. It is important that every application have a user-friendly interface. An effective user interface can decrease the time, costs, and energy needed to learn how to use a program. In this paper, we survey the user interface of OpenSim as an important factor of the software. Finally, we infer that there are many challenges to be addressed in the development of OpenSim.

Keywords: biomechanics, computer engineering, graphical user interface, modeling and simulation, interface effectiveness

Procedia PDF Downloads 88
7937 Manufacturing of Vacuum Glazing with Metal Edge Seal

Authors: Won Kyeong Kang, Tae-Ho Song

Abstract:

Vacuum glazing (VG) is a super insulator, which is able to greatly improve the energy efficiency of building. However, a significant amount of heat loss occurs through the welded edge of conventional VG. The joining method should be improved for further application and commercialization. For this purpose VG with metal edge seal is conceived. In this paper, the feasibility of joining stainless steel and soda lime glass using glass solder is assessed numerically and experimentally. In the case of very thin stainless steel, partial joining with glass is identified, which need further improvement for practical application.

Keywords: VG, metal edge seal, vacuum glazing, manufacturing,

Procedia PDF Downloads 602
7936 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 12
7935 Developing a Maturity Model of Digital Twin Application for Infrastructure Asset Management

Authors: Qingqing Feng, S. Thomas Ng, Frank J. Xu, Jiduo Xing

Abstract:

Faced with unprecedented challenges including aging assets, lack of maintenance budget, overtaxed and inefficient usage, and outcry for better service quality from the society, today’s infrastructure systems has become the main focus of many metropolises to pursue sustainable urban development and improve resilience. Digital twin, being one of the most innovative enabling technologies nowadays, may open up new ways for tackling various infrastructure asset management (IAM) problems. Digital twin application for IAM, as its name indicated, represents an evolving digital model of intended infrastructure that possesses functions including real-time monitoring; what-if events simulation; and scheduling, maintenance, and management optimization based on technologies like IoT, big data and AI. Up to now, there are already vast quantities of global initiatives of digital twin applications like 'Virtual Singapore' and 'Digital Built Britain'. With digital twin technology permeating the IAM field progressively, it is necessary to consider the maturity of the application and how those institutional or industrial digital twin application processes will evolve in future. In order to deal with the gap of lacking such kind of benchmark, a draft maturity model is developed for digital twin application in the IAM field. Firstly, an overview of current smart cities maturity models is given, based on which the draft Maturity Model of Digital Twin Application for Infrastructure Asset Management (MM-DTIAM) is developed for multi-stakeholders to evaluate and derive informed decision. The process of development follows a systematic approach with four major procedures, namely scoping, designing, populating and testing. Through in-depth literature review, interview and focus group meeting, the key domain areas are populated, defined and iteratively tuned. Finally, the case study of several digital twin projects is conducted for self-verification. The findings of the research reveal that: (i) the developed maturity model outlines five maturing levels leading to an optimised digital twin application from the aspects of strategic intent, data, technology, governance, and stakeholders’ engagement; (ii) based on the case study, levels 1 to 3 are already partially implemented in some initiatives while level 4 is on the way; and (iii) more practices are still needed to refine the draft to be mutually exclusive and collectively exhaustive in key domain areas.

Keywords: digital twin, infrastructure asset management, maturity model, smart city

Procedia PDF Downloads 150
7934 Appropriate Nutrient Management for Wheat Production in Afghanistan

Authors: Azizurahman Sakhizadah, Tsugiyuki Masunaga

Abstract:

The use of sulfur fertilizer by Afghanistan farmers for wheat production has never been practiced, although sulfur deficiency has been expected for wheat production. A field experiment was conducted at Poza e Ishan Research Station Farm, Baghlan province, Afghanistan to examine the effect of sulfur fertilizer on growth and yield components of wheat. The experiment was laid out in randomize complete block design (RCBD), having three replications and eight treatments. The initial soil of experiment was alkaline (pH8.4), with textural class of sandy clay loam, available sulfur (40.8) mg kg-1, and Olsen-P (28.8) mg kg-1. Wheat variety, Kabul 013 was cultivated from November 2015 to June 2016. The recommended doses of nitrogen and Phosphors (Urea and DAP at 250 and 125 kg ha-1) were applied by broadcasting except control plot. Sulfur was applied by foliar spray (K2 SO4) at the rate of 10, 20, and 30 kg ha-1, split at tillering and flowering stages. The results demonstrated that sulfur application positively influenced on growth and yield of wheat crop with combination of nitrogen. Plant did not respond to sole sulfur application. Plant height, spike length, spikelet's number spike-1, were increased and yield g m-2 was also increased by 1.2, 19.1 and 25.1 % for 10, 20 and 30 kg sulfur ha-1 application.

Keywords: sulfur, nitrogen, wheat, foliar

Procedia PDF Downloads 141
7933 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 271
7932 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 224
7931 Improvement in Drying Characteristics of Raisin by Carbonic Maceration– Process Optimization

Authors: Nursac Akyol, Merve S. Turan, Mustafa Ozcelik, Erdogan Kucukoner, Erkan Karacabey

Abstract:

Traditional raisin production is a long time drying process under sunlight. During this procedure, grapes are open to some environmental effects besides the adverse effects of the long drying period. Thus, there is a need to develop an alternative method being applicable instead of traditional one. To this extent, a combination of a potential pretreatment (carbonic maceration, CM) with convectional oven drying was examined. CM application was used in raisin production (grape drying) as a pretreatment process before oven drying. Pressure, temperature and time were examined as application parameters of CM. In conventional oven drying, the temperature is a process variable. The aim is to find out how CM and convectional drying processes affect the drying characteristics of grapes as well as their physical and chemical properties. For this purpose, the response surface method was used to determine both the effects of the variables and the optimum pretreatment and drying conditions. The optimum conditions of CM for raisin production were 0.3 MPa of pressure value, 4°C of application temperature and 8 hours of application time. The optimized drying temperature was 77°C. The results showed that the application of CM before the drying process improved the drying characteristics. Drying took only 389 minutes for grapes pretreated by CM under optimum conditions and 495 minutes for the control group dried only by the conventional drying process. According to these results, a decrease of 21% was achieved in the time requirement for raisin production. Also, it was observed that the samples dried under optimum conditions had similar physical properties as those the control group had. It was seen that raisin, which was dried under optimum conditions were in better condition in terms of some of the bioactive contents compared to control groups. In light of all results, it is seen that CM has an important potential in the industrial drying of grape samples. The current study was financially supported by TUBITAK, Turkey (Project no: 116R038).

Keywords: drying time, pretreatment, response surface methodlogy, total phenolic

Procedia PDF Downloads 128
7930 Experimental Analyses of Thermoelectric Generator Behavior Using Two Types of Thermoelectric Modules for Marine Application

Authors: A. Nour Eddine, D. Chalet, L. Aixala, P. Chessé, X. Faure, N. Hatat

Abstract:

Thermal power technology such as the TEG (Thermo-Electric Generator) arouses significant attention worldwide for waste heat recovery. Despite the potential benefits of marine application due to the permanent heat sink from sea water, no significant studies on this application were to be found. In this study, a test rig has been designed and built to test the performance of the TEG on engine operating points. The TEG device is built from commercially available materials for the sake of possible economical application. Two types of commercial TEM (thermo electric module) have been studied separately on the test rig. The engine data were extracted from a commercial Diesel engine since it shares the same principle in terms of engine efficiency and exhaust with the marine Diesel engine. An open circuit water cooling system is used to replicate the sea water cold source. The characterization tests showed that the silicium-germanium alloys TEM proved a remarkable reliability on all engine operating points, with no significant deterioration of performance even under sever variation in the hot source conditions. The performance of the bismuth-telluride alloys was 100% better than the first type of TEM but it showed a deterioration in power generation when the air temperature exceeds 300 °C. The temperature distribution on the heat exchange surfaces revealed no useful combination of these two types of TEM with this tube length, since the surface temperature difference between both ends is no more than 10 °C. This study exposed the perspective of use of TEG technology for marine engine exhaust heat recovery. Although the results suggested non-sufficient power generation from the low cost commercial TEM used, it provides valuable information about TEG device optimization, including the design of heat exchanger and the types of thermo-electric materials.

Keywords: internal combustion engine application, Seebeck, thermo-electricity, waste heat recovery

Procedia PDF Downloads 241
7929 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 335
7928 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application

Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa

Abstract:

Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.

Keywords: bio medical, mental helath care, empower youths & adults, counselling

Procedia PDF Downloads 150
7927 Advanced Materials Based on Ethylene-Propylene-Diene Terpolymers and Organically Modified Montmorillonite

Authors: M. D. Stelescu, E. Manaila, G. Pelin, M. Georgescu, M. Sonmez

Abstract:

This paper presents studies on the development and characterization of nanocomposites based on ethylene-propylene terpolymer rubber (EPDM), chlorobutyl rubber (IIR-Cl) and organically modified montmorillonite (OMMT). Mixtures were made containing 0, 3 and 6 phr (parts per 100 parts rubber) OMMT, respectively. They were obtained by melt intercalation in an internal mixer - Plasti-Corder Brabender, in suitable blending parameters, at high temperature for 11 minutes. Curing agents were embedded on a laboratory roller at 70-100 ºC, friction 1:1.1, processing time 5 minutes. Rubber specimens were obtained by compression, using a hydraulic press at 165 ºC and a pressing force of 300 kN. Curing time, determined using the Monsanto rheometer, decreases with the increased amount of OMMT in the mixtures. At the same time, it was noticed that mixtures containing OMMT show improvement in physical-mechanical properties. These types of nanocomposites may be used to obtain rubber seals for the space application or for other areas of application.

Keywords: chlorobutyl rubber, ethylene-propylene-diene terpolymers, montmorillonite, rubber seals, space application

Procedia PDF Downloads 170
7926 Design of a Service-Enabled Dependable Integration Environment

Authors: Fuyang Peng, Donghong Li

Abstract:

The aim of information systems integration is to make all the data sources, applications and business flows integrated into the new environment so that unwanted redundancies are reduced and bottlenecks and mismatches are eliminated. Two issues have to be dealt with to meet such requirements: the software architecture that supports resource integration, and the adaptor development tool that help integration and migration of legacy applications. In this paper, a service-enabled dependable integration environment (SDIE), is presented, which has two key components, i.e., a dependable service integration platform and a legacy application integration tool. For the dependable platform for service integration, the service integration bus, the service management framework, the dependable engine for service composition, and the service registry and discovery components are described. For the legacy application integration tool, its basic organization, functionalities and dependable measures taken are presented. Due to its service-oriented integration model, the light-weight extensible container, the service component combination-oriented p-lattice structure, and other features, SDIE has advantages in openness, flexibility, performance-price ratio and feature support over commercial products, is better than most of the open source integration software in functionality, performance and dependability support.

Keywords: application integration, dependability, legacy, SOA

Procedia PDF Downloads 356
7925 Conductivity and Selection of Copper Clad Steel Wires for Grounding Applications

Authors: George Eduful, Kingsford J. A. Atanga

Abstract:

Copper clad steel wire (CCS) is primarily used for grounding applications to reduce the high incidence of copper ground conductor theft in electrical installations. The cross sectional area of the CCS is selected by relating the diameter equivalence to a copper conductor. The main difficulty is how to use a simple analytical relation to determine the right conductivity of CCS for a particular application. The use of Eddy-Current instrument for measuring conductivity is known but in most cases, the instrument is not readily available. The paper presents a simplified approach on how to size and determine CCS conductivity for a given application.

Keywords: copper clad steel wire, conductivity, grounding, skin effect

Procedia PDF Downloads 279
7924 Applying the Integrative Design Process in Architectural Firms: An Analytical Study on Egyptian Firms

Authors: Carole A. El Raheb, Hassan K. Abdel-Salam, Ingi Elcherif

Abstract:

An architect carrying the design process alone is the main reason for the deterioration of the quality of the architectural product as the complexity of the projects makes it a multi-disciplinary work; then, the Integrative Design Process (IDP) must be applied in the architectural firm especially from the early design phases to improve the product’s quality and to eliminate the ignorance of the principles of design causing the occurrence of low-grade buildings. The research explores the Integrative Design (ID) principles that fit in the architectural practice. Constraints facing this application are presented with strategies and solutions to overcome them. A survey questionnaire was conducted to collect data from a number of recognized Egyptian Architecture, Engineering and Construction (AEC) firms that explores their opinions on using the IDP. This survey emphasizes the importance of the IDP in firms and presents the reasons preventing the firms from applying the IDP. The aim here is to investigate the potentials of integrating this approach into architectural firms emphasizing the importance of this application which ensures the realization of the project’s goal and eliminates the reduction in the project’s quality.

Keywords: application, architectural firms, integrative design principles, integrative design process, the project quality

Procedia PDF Downloads 226
7923 Studies on the Effect of Bio-Methanated Distillery Spentwash on Soil Properties and Crop Yields

Authors: S. K. Gali

Abstract:

Spentwash, An effluent of distillery is an environmental pollutant because of its high load of pollutants (pH: 2-4; BOD>40,000 mg/l, COD>100,000mg/l and TDS >70,000mg/l). But However, after subjecting it to primary treatment (bio-methanation), Its pollutant load gets drastically reduced (pH: 7.5-8.5, BOD<10,000 mg/l) and could be disposed off safely as a source of organic matter and plant nutrients for crop production. With the consent of State Pollution Control Board, the distilleries in Karnataka are taking up ‘one time controlled land application’ of bio-methanated spentwash in farmers’ fields. A monitoring study was undertaken in Belgaum district of Karnataka State with an objective of studying the effect of land application of bio-methanated spent wash of a distillery on soil properties and crop growth. The treated spentwash was applied uniformly to the fallow dry lands in different farmers’ fields during summer, 2012 at recommended rate (based on nitrogen requirement of crops). The application was made at least a fortnight before sowing/planting operations. The analysis of soils collected before land application of spentwash and after harvest of crops revealed that there was no adverse effect of applied spentwash on soil characteristics. A slight build up in soluble salts was observed but, however all the soils recorded EC of less than 2.0 dSm-1. An increase in soil organic carbon (SOC) and available nitrogen (N) by about 10 to 30 % was observed in the spentwash applied soils. The presence of good amount of biodegradable organics in the treated spentwash (BOD of 6550 mg/l) contributed for increase in SOC and N. A substantial build up in available potassium (K) status (50 to 200%) was observed due to spentwash application. This was attributed to the high K content in spentwash (6950 mg/l). The growth of crops in the spentwash applied fields was higher and farmers could get nearly 10 to 20 per cent higher yields, especially in sugarcane and corn. The analysis of ground water samples showed that the quality of water was not affected due to land application of treated spentwash. Apart from realizing higher crop yields, the farmers were able to save money on N and K fertilisers as the applied spentwash met the crop requirement. Hence, it could be concluded that the bio-methanated distillery spentwash can be gainfully utilized in crop production without polluting the environment.

Keywords: bio-methanation, pollutant, potassium status, soil organic carbon

Procedia PDF Downloads 389
7922 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 368
7921 Ethnic Minority Small and Medium Enterprises and Entrepreneurial Resilience During the COVID-19 Pandemic: A Case of United Kingdom

Authors: Muhammad Bilal Mustafa, Javed Hussain, Simeon Babatunde

Abstract:

The Covid-19 pandemic has exposed the vulnerabilities of countless organisations beyond their size, type, and location. However, some groups and sectors are disproportionally get impacted by the pandemic. In the context of the UK, ethnic Small and Medium Enterprises (SMEs) turn out to be the most precarious group among all private sectors. Many ethnic SMEs shut down their business operations during a pandemic. A large portion of Black, Asian and minority ethnic (BAME) owners have huge concerns regarding their business’ survival and resilience. The current UK-centric studies have focused on the large business population, and there is a gap in ethnic SMEs and how they get affected by the Covid-19 pandemic. Moreover, there is a need to further knowledge and academic research to investigate the fundamental factors that could strengthen the resilience of ethnic SMEs as well as contribute to long-term sustainability. Therefore, this study aims to capture the effect of the Covid-19 pandemic on ethnic SMEs in the UK and assess the survival measures taken by ethnic SMEs during Covid-19. Besides, this study adopts a dynamic capabilities perspective that how firms' specific capabilities enable ethnic SMEs to exploit entrepreneurial opportunities during the Covid-19 pandemic. Finally, this research will help ethnic SMEs to develop vigorous resilience to address future external shocks and market uncertainties.

Keywords: COVID-19 pandemic, ethnic minority SMEs, entrepreneurial resilience, dynamic capabilities, sustainability

Procedia PDF Downloads 155
7920 Virtualizing Attendance and Reducing Impacts on the Environment with a Mobile Application

Authors: Paulo R. M. Andrade, Adriano B. Albuquerque, Otávio F. Frota, Robson V. Silveira, Fátima A. da Silva

Abstract:

Information technology has been gaining more and more space whether in industry, commerce or even for personal use, but the misuse of it brings harm to the environment and human health as a result. Contribute to the sustainability of the planet is to compensate the environment, all or part of what withdraws it. The green computing also came to propose practical for use in IT in an environmentally correct way in aid of strategic management and communication. This work focuses on showing how a mobile application can help businesses reduce costs and reduced environmental impacts caused by its processes, through a case study of a public company in Brazil.

Keywords: green computing, information technology, e-government, sustainable development, mobile computing

Procedia PDF Downloads 414
7919 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 35
7918 Coating of Polyelectrolyte Multilayer Thin Films on Poly(S/EGDMA) HIPE Loaded with Hydroxyapatite as a Scaffold for Tissue Engineering Application

Authors: Kornkanok Noulta, Pornsri Pakeyangkoon, Stephen T. Dubas, Pomthong Malakul, Manit Nithithanakul

Abstract:

In recent years, interest in the development of material for tissue engineering application has increased considerably. Poly(High Internal Phase Emulsion) (PolyHIPE) foam is a material that is good candidate for used in tissue engineering application due to its 3D structure and highly porous with interconnected pore. The PolyHIPE was prepared from poly (styrene/ethylene glycol dimethacrylate) through high internal phase emulsion polymerization technique and loaded with hydroxyapatite (HA) to improve biocompatibility. To further increase hydrophilicity of the obtained polyHIPE, layer-by-layer polyelectrolyte multilayers (PEM) technique was used. A surface property of polyHIPE was characterized by contact angle measurement. Morphology and pore size was observed by scanning electron microscope (SEM). The cell viability was revealed by the 3-(4, 5-dimethylthiazol-2-yl)-2, 5-diphenyltetrazolium bromide (MTT) assay technique.

Keywords: polyelectrolyte multilayer thin film, high internal phase emulsion, polyhipe foam, scaffold, tissue engineering

Procedia PDF Downloads 348
7917 A Mobile Application for Analyzing and Forecasting Crime Using Autoregressive Integrated Moving Average with Artificial Neural Network

Authors: Gajaanuja Megalathan, Banuka Athuraliya

Abstract:

Crime is one of our society's most intimidating and threatening challenges. With the majority of the population residing in cities, many experts and data provided by local authorities suggest a rapid increase in the number of crimes committed in these cities in recent years. There has been an increasing graph in the crime rates. People living in Sri Lanka have the right to know the exact crime rates and the crime rates in the future of the place they are living in. Due to the current economic crisis, crime rates have spiked. There have been so many thefts and murders recorded within the last 6-10 months. Although there are many sources to find out, there is no solid way of searching and finding out the safety of the place. Due to all these reasons, there is a need for the public to feel safe when they are introduced to new places. Through this research, the author aims to develop a mobile application that will be a solution to this problem. It is mainly targeted at tourists, and people who recently relocated will gain advantage of this application. Moreover, the Arima Model combined with ANN is to be used to predict crime rates. From the past researchers' works, it is evidently clear that they haven’t used the Arima model combined with Artificial Neural Networks to forecast crimes.

Keywords: arima model, ANN, crime prediction, data analysis

Procedia PDF Downloads 122
7916 Applying an Application-Based Knowledge Capturing and Reusing for Construction Consultant Organizations Applying

Authors: Phan Nghiem Vu, Le Tuan Vu, Ta Quang Tai

Abstract:

Knowledge Management effectively is critical to the survival and advance of a company, especially in company-based industries such as construction. Knowledge management practice is crucial to the survival and progress of a company, especially company-based knowledge such as construction consultancy. Effective knowledge management practices are very significant to the competitive and development of a consulting organization. Hence, the success of knowledge management implementation depends on knowledge capturing and reusing effectively. In this paper, a survey was carried out of engineers and managers with experience in seven construction consulting organizations that provide services on the north-central coast of Vietnam. The main objectives of the survey to finding out how these organizations capture and reuse knowledge and significant barriers to the implementation of knowledge management. A conceptual framework based-on Trello application is proposed to formalize the knowledge-capturing and reusing process within construction consulting companies. It is showed that the conceptual framework could be used to manage both implicit and explicit knowledge effectively in construction consultant organizations.

Keywords: knowledge management, construction consultant organization, knowledge capturing, reusing knowledge, application-based technology

Procedia PDF Downloads 125
7915 Valuation on MEMS Pressure Sensors and Device Applications

Authors: Nurul Amziah Md Yunus, Izhal Abdul Halin, Nasri Sulaiman, Noor Faezah Ismail, Ong Kai Sheng

Abstract:

The MEMS pressure sensor has been introduced and presented in this paper. The types of pressure sensor and its theory of operation are also included. The latest MEMS technology, the fabrication processes of pressure sensor are explored and discussed. Besides, various device applications of pressure sensor such as tire pressure monitoring system, diesel particulate filter and others are explained. Due to further miniaturization of the device nowadays, the pressure sensor with nanotechnology (NEMS) is also reviewed. The NEMS pressure sensor is expected to have better performance as well as lower in its cost. It has gained an excellent popularity in many applications.

Keywords: pressure sensor, diaphragm, MEMS, automotive application, biomedical application, NEMS

Procedia PDF Downloads 660
7914 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 109
7913 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 260