Search results for: secure web sockets
318 Early Childhood Education in a Depressed Economy in Nigeria: Implication in the Classroom
Authors: Ogunnaiya Racheal Taiwo
Abstract:
Children's formative years are crucial to their growth; it is, therefore, necessary for all the stakeholders to ensure that the pupils have an enabling quality of life which is essential for realizing their potential. For children to live and grow, they need a secure home, nutritious food, good health care, and quality education. This paper, therefore, investigates the implications of a depressed economy on the classroom learning of Nigerian children as it is clear that Nigeria is currently experiencing the worst economic depression in several decades, which affects a substantial proportion of children. The study is qualitative research, and it adopts a phenomenological approach where the experiences of respondents are examined qualitatively. Three senatorial districts in Oyo State were considered, and 50 teachers, both male, and female were chosen from each senatorial district for an interview through conversational key informants' interviews. The interviewees were recorded, transcribed, and presented using thematic analysis. Findings showed that more children have dropped out since the beginning of the year than in previous years. It was also recorded that learning has become challenging as children now find it harder to acquire learning materials. It was recommended that the government should reimburse early childhood schools to lessen the effect of the inability to purchase materials and pay school fees. It was also recommended that an intervention be made to approach and resolve issues associated with out-of-school children.Keywords: childhood, classroom, education, depressed economy, poverty
Procedia PDF Downloads 108317 From De Soto’s Solution to Urban Disaster: The Effects of Land Titling Policies on the Development of Cities of the Global South in the Case of Lima Peru
Authors: Jitka Molnarova
Abstract:
Based on De Soto’s idea that a formal land title can provide a secure home and access to credit to poor urban families, a large number of developing countries accepted the formalization of informal settlements as the ultimate solution for their housing crises and struggles with poverty. After two decades of implementation, very little is known about the effects this policy has on the quality of the neighborhoods it produces and on the development of cities in general. Using the capital of Peru -where the solution originated- as a case study, this paper illustrates the negative outcomes this policy has on urban development arguing that land titling encourages 1) expansion of the city often to areas of high physical risk, 2) production of precarious housing on unserviced land, and 3) practices of illegal land trafficking. The evidence is based on interviews with community leaders and officials working at the Cooperation for Formalization of Informal Property (COFOPRI), comparison of satellite images documenting the expansion of Lima in the past twenty years, and a technical evaluation of dozens of houses that have been or are in the process of being granted a land title.Keywords: COFOPRI, De Soto, housing policies, land titling, land trafficking, Lima, Peru, precarious housing, urban expansion
Procedia PDF Downloads 187316 Improving the Performance of Road Salt on Anti-Icing
Authors: Mohsen Abotalebi Esfahani, Amin Rahimi
Abstract:
Maintenance and management of route and roads infrastructure is one of the most important and the most fundamental principles of the countries. Several methods have been under investigation as preventive proceedings for the maintenance of asphalt pavements for many years. Using a mixture of salt, sand and gravel is the most common method of deicing, which could have numerous harmful consequences. Icy or snow-covered road is one of the major reasons of accidents in rainy seasons, which causes substantial damages such as loss of time and energy, environmental pollution, destruction of buildings, traffic congestion and rising possibility of accidents. Regarding this, every year the government incurred enormous costs to secure traverses. In this study, asphalt pavements have been cured, in terms of compressive strength, tensile strength and resilient modulus of asphalt samples, under the influence of Magnesium Chloride, Calcium Chloride, Sodium Chloride, Urea and pure water; and showed that de-icing with the calcium chloride solution and urea have the minimum negative effect and de-icing with pure water has most negative effect on laboratory specimens. Hence some simple techniques and new equipment and less use of sand and salt, can reduce significantly the risks and harmful effects of excessive use of salt, sand and gravel and at the same time use the safer roads.Keywords: maintenance, sodium chloride, icyroad, calcium chloride
Procedia PDF Downloads 285315 Application of Cloud Based Healthcare Information System through a Smart Card in Kingdom of Saudi Arabia
Authors: Wasmi Woishi
Abstract:
Smart card technology is a secure and safe technology that is expanding its capabilities day by day in terms of holding important information without alteration. It is readily available, and its ease of portability makes it more efficient in terms of its usage. The smart card is in use by many industries such as financial, insurance, governmental industries, personal identification, to name a few. Smart card technology is popular for its wide familiarity, adaptability, accessibility, benefits, and portability. This research aims to find out the perception toward the application of a cloud-based healthcare system through a smart card in KSA. The research has compiled the countries using a smart card or smart healthcare card and indicated the potential benefits of implementing smart healthcare cards. 120 participants from Riyadh city were surveyed by the means of a closed-ended questionnaire. Data were analyzed through SPSS. This research extends the research body in the healthcare system. Empirical evidence regarding smart healthcare cards is scarce and hence undertaken in this study. The study provides a useful insight into collecting, storing, analyzing, manipulating, and accessibility of medical information regarding smart healthcare cards. Research findings can help achieve KSA's Vision 2030 goals in terms of the digitalization of healthcare systems in improving its efficiency and effectiveness in storing and accessing healthcare data.Keywords: smart card technology, healthcare using smart cards, smart healthcare cards, KSA healthcare information system, cloud-based healthcare cards
Procedia PDF Downloads 163314 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 103313 Empowering Certificate Management with Blockchain Technology
Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware
Abstract:
The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker
Procedia PDF Downloads 47312 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 322311 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security
Authors: Katie Wood
Abstract:
Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity
Procedia PDF Downloads 242310 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 134309 Measurement of Natural Radioactivity and Health Hazard Index Evaluation in Major Soils of Tin Mining Areas of Perak
Authors: Habila Nuhu
Abstract:
Natural radionuclides in the environment can significantly contribute to human exposure to ionizing radiation. The knowledge of their levels in an environment can help the radiological protection agencies in policymaking. Measurement of natural radioactivity in major soils in the tin mining state of Perak Malaysia has been conducted using an HPGe detector. Seventy (70) soil samples were collected at widely distributed locations in the state. Six major soil types were sampled, and thirteen districts around the state were covered. The following were the results of the 226Ra (238U), 228Ra (232Th), and 40K activity in the soil samples: 226Ra (238U) has a mean activity concentration of 191.83 Bq kg⁻¹, more than five times the UNSCEAR reference limits of 35 Bq kg⁻¹. The mean activity concentration of 228Ra (232Th) with a value of 232.41 Bq kg⁻¹ is over seven times the UNSCEAR reference values of 30 Bq kg⁻¹. The average concentration of 40K activity was 275.24 Bq kg⁻¹, which was less than the UNSCEAR reference limit of 400 Bq Kg⁻¹. The range of external hazards index (Hₑₓ) values was from 1.03 to 2.05, while the internal hazards index (Hin) was from 1.48 to 3.08. The Hex and Hin should be less than one for minimal external and internal radiation threats as well as secure use of soil material for building construction. The Hₑₓ and Hin results generally indicate that while using the soil types and their derivatives as building materials in the study area, care must be taken.Keywords: activity concentration, hazard index, soil samples, tin mining
Procedia PDF Downloads 111308 Adoption of Performance Management System in a Saudi Telecom Company: An Institutional Perspective
Authors: Mohammed Buhaya
Abstract:
Purpose: The purpose of this study is to analyze the decision, implementation process and the outcomes of the introduction of the balanced scorecard in a developing country having particular regard to the impacts of agency and institutional, endogenous and exogenous. Design/methodology/approach: This study builds on a longitudinal explanatory case study, an institutional framework, especially Ter-Bogt and Scapens (2014) framework. Findings: Empirical findings drawn from a telecom company indicate that the dynamics of change of the company are influenced by the interconnection of external institutions and the company's situation and internal institutions encompassing issues of power, politics, and culture. Organizational practice introduced to secure external legitimacy is not always the case. The adoption of the balanced scorecard was the instrumental manner and had revolutionary change. Originality/value: In contrast to much previous research on management accounting practice, the paper analyses the process of change in one of developing country. The study also sheds new light on the power of religion as one of institutional logics and how this logic rises to potential to influence management accounting change among actors and achieving the company’s targets. This paper highlights how the culture and values can play a vital role in making the process of change smoother.Keywords: balanced scorecard, institutional, management accounting practice, rules, and routines
Procedia PDF Downloads 168307 Wind Power Forecasting Using Echo State Networks Optimized by Big Bang-Big Crunch Algorithm
Authors: Amir Hossein Hejazi, Nima Amjady
Abstract:
In recent years, due to environmental issues traditional energy sources had been replaced by renewable ones. Wind energy as the fastest growing renewable energy shares a considerable percent of energy in power electricity markets. With this fast growth of wind energy worldwide, owners and operators of wind farms, transmission system operators, and energy traders need reliable and secure forecasts of wind energy production. In this paper, a new forecasting strategy is proposed for short-term wind power prediction based on Echo State Networks (ESN). The forecast engine utilizes state-of-the-art training process including dynamical reservoir with high capability to learn complex dynamics of wind power or wind vector signals. The study becomes more interesting by incorporating prediction of wind direction into forecast strategy. The Big Bang-Big Crunch (BB-BC) evolutionary optimization algorithm is adopted for adjusting free parameters of ESN-based forecaster. The proposed method is tested by real-world hourly data to show the efficiency of the forecasting engine for prediction of both wind vector and wind power output of aggregated wind power production.Keywords: wind power forecasting, echo state network, big bang-big crunch, evolutionary optimization algorithm
Procedia PDF Downloads 573306 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 404305 ChatGPT as a “Foreign Language Teacher”: Attitudes of Tunisian English Language Learners
Authors: Leila Najeh Bel'Kiry
Abstract:
Artificial intelligence (AI) brought about many language robots, with ChatGPT being the most sophisticated thanks to its human-like linguistic capabilities. This aspect raises the idea of using ChatGPT in learning foreign languages. Starting from the premise that positions ChatGPT as a mediator between the language and the leaner, functioning as a “ghost teacher" offering a peaceful and secure learning space, this study aims to explore the attitudes of Tunisian students of English towards ChatGPT as a “Foreign Language Teacher” . Forty-five students, in their third year of fundamental English at Tunisian universities and high institutes, completed a Likert scale questionnaire consisting of thirty-two items and covering various aspects of language (phonology, morphology, syntax, semantics, and pragmatics). A scale ranging from 'Strongly Disagree,' 'Disagree,' 'Undecided,' 'Agree,' to 'Strongly Agree.' is used to assess the attitudes of the participants towards the integration of ChaGPTin learning a foreign language. Results indicate generally positive attitudes towards the reliance on ChatGPT in learning foreign languages, particularly some compounds of language like syntax, phonology, and morphology. However, learners show insecurity towards ChatGPT when it comes to pragmatics and semantics, where the artificial model may fail when dealing with deeper contextual and nuanced language levels.Keywords: artificial language model, attitudes, foreign language learning, ChatGPT, linguistic capabilities, Tunisian English language learners
Procedia PDF Downloads 65304 Prospects of Oman as a Destination for Halal Tourism
Authors: Asad Rehman
Abstract:
Although a vast majority relates the concept of ‘halal’ or what is permissible in Islam to food only. However, halal industry covers many sectors such as food, fashion, transport, finance and even tourism. Halal tourism is not just about halal food; it is also about the overall experience, which is amenable with the Shariah (Islamic jurisprudence). Oman has a plethora of natural beauty and many places of interest for all types of tourists. It is one of the most secure and peaceful countries in the world. Having a well-developed Infrastructure, Oman is ready to take its tourism to new heights. The ever-hospitable Omanis are proud of their rich cultural and historical heritage. Thus, Oman appears to have all what it takes to become a prime destination for halal tourism. The objective of this study is to assess the prospects of Oman as a destination for halal tourism. Based on the interviews of experts like academicians, tourism professionals, officials and clerics, Oman’s competitiveness as a destination for halal tourism was assessed by developing a Strengths, Weaknesses, Opportunities and Threats (SWOT) profile. The findings of the SWOT were compared with the data from the Global Muslim Travel Index (GMTI) from the year 2014 to 2018. Based on the analysis, Oman is found to have the right mix of environment and enabling services for halal tourism. However, it is found lacking in public transport, communication and customer outreach. Oman is also found to be losing its rank among the top 10 destinations for halal tourism to close competitors like Qatar, Bahrain, Morocco, etc. The concerned authorities need to make conscious efforts to resolve these issues as it becomes imperative for Oman to revamp its tourism strategy.Keywords: destination, halal, Islam, SWOT, tourism
Procedia PDF Downloads 156303 E-Government Adoption in Zimbabwe's Local Government: Understanding the Influence of Attitudes and Perceptions of Residents in Selected Cases
Authors: Ricky Munyaradzi Mukonza
Abstract:
E-government literature continues to grow as scholars and practitioners endeavour to understand this phenomenon. There are many facets of e-government that have been written about including its definition, adoption, and implementation and so on. However, more still needs to be known particularly in relation to how e-government is being adopted in different contexts. There could be many context specific factors that have a bearing on e-government adoption and in this paper focus is on attitudes and perceptions. Association between usage of e-government services and various perceptions such as ease of use, transparency, security, ease of understanding, communication, reliability, relevancy, perceived usefulness and perceived trust is examined. Within the Zimbabwean context and in particular the country’s local government sphere, such a study has not been done. The main aim of the paper is therefore to establish perceptions and attitudes towards e-government services among residents in Zimbabwe’s two local authorities. In terms of research methodology the paper is based on a Mixed Methods Approach (MMA) to collect and analyse data giving the researcher a holistic picture of the phenomenon being investigated. A sample of 785 residents from the two local authorities was used and these were selected using a combination of cluster and purposive sampling methods. A key finding in this paper is that a majority of respondents who have had the opportunity to use e-government services perceive the services to be easy to use, transparent, secure, easy to understand, reliable, relevant, useful and trustworthy. The paper, therefore, makes an important contribution on the relationship between residents’ perceptions and attitudes and e-government usage within the chosen cases.Keywords: adoption, attitudes, e-government, perceptions
Procedia PDF Downloads 313302 Environmental Strategies Towards Sustainable Development in Nigeria
Authors: Sirajoddeen Al-Ameen
Abstract:
Researchers seek to introduce development leading to technologies that address environmental problems and learn how to interact with stakeholders, managers, and policymakers for appropriate actions. One of the greatest strategies that African countries need to consider in realizing sustainable development is effective, efficient, credible, and lasting environmental sustainability and ensuring that future generations have access to natural resources to live in a better way. Therefore the coordinated set of participatory and continuously improving processes of analysis, capacity, planning, and investment seeks to integrate the social and environmental objectives of society, and this is not given priority in Nigeria. Environmental sustainability is a field where people can understand the natural environment and public works for sustainable development. Sustainable development requires shifts from ordinary ways of doing things to modern ways of executing activities ranging from low to high productivity, the creation and adoption of new strategies, new skills, and knowledge. It ensures a developed world with a secure and healthy environment for all; human beings, animals, and plants alike. This paper is to carry out a review of various literature sources to ascertain the potential strategy of environment and sustainable development reform using the content analysis method to discuss the environmental strategies towards sustainable development in Nigeria. The objective of this paper is to enable Nigerians to understand and have an orientation on how to manage environmental resources and avoid environmental impact on the ecosystem, and also to find sustainable solutions for environmental issues without compromising economic development.Keywords: development, environment, strategies, sustainable
Procedia PDF Downloads 108301 Determinants of Aggregate Electricity Consumption in Ghana: A Multivariate Time Series Analysis
Authors: Renata Konadu
Abstract:
In Ghana, electricity has become the main form of energy which all sectors of the economy rely on for their businesses. Therefore, as the economy grows, the demand and consumption of electricity also grow alongside due to the heavy dependence on it. However, since the supply of electricity has not increased to match the demand, there has been frequent power outages and load shedding affecting business performances. To solve this problem and advance policies to secure electricity in Ghana, it is imperative that those factors that cause consumption to increase be analysed by considering the three classes of consumers; residential, industrial and non-residential. The main argument, however, is that, export of electricity to other neighbouring countries should be included in the electricity consumption model and considered as one of the significant factors which can decrease or increase consumption. The author made use of multivariate time series data from 1980-2010 and econometric models such as Ordinary Least Squares (OLS) and Vector Error Correction Model. Findings show that GDP growth, urban population growth, electricity exports and industry value added to GDP were cointegrated. The results also showed that there is unidirectional causality from electricity export and GDP growth and Industry value added to GDP to electricity consumption in the long run. However, in the short run, there was found to be a directional causality among all the variables and electricity consumption. The results have useful implication for energy policy makers especially with regards to electricity consumption, demand, and supply.Keywords: electricity consumption, energy policy, GDP growth, vector error correction model
Procedia PDF Downloads 437300 Institutional Structures Shaping Female Representation in Politics in Pakistan
Authors: Neelum Maqsood
Abstract:
This paper is a study of how institutional structures shape the policy-making activities of female legislators. The literature on this area indicates that if there is an institution created by men to secure elite interests, women will face constraints in legislative activities. This paper will analyze the institutional setting in Pakistan and document the conditions women face that both restrict or enable them from representing the general interests of other women. The main experimental design depends on the variation of international scrutiny that Pakistan faces in two different time periods that will be classified as high international scrutiny and low international scrutiny. A high international scrutiny period is one where Pakistan comes under the international lens because of a domestic event that has international ramifications, for example, in terms of gender equality. The argument is that women parliamentarians receive different treatment in periods of high international scrutiny. As Pakistan comes under scrutiny, women will be more active in their legislative activities than in low international scrutiny, as male parliamentarians will be less likely to influence or restrain women’s activities. Using this variation, the trends in memberships and support functions given to women in these two time periods will be studied. The second variation will comprise the analysis of male and female assignments, training, and funding on general seats across time, which will require data collection over this time of 12-15 years, including the years during the war when Pakistan was under high international scrutiny.Keywords: female representation, gender equality, democratic institutions, quota seats
Procedia PDF Downloads 85299 Three Tier Indoor Localization System for Digital Forensics
Authors: Dennis L. Owuor, Okuthe P. Kogeda, Johnson I. Agbinya
Abstract:
Mobile localization has attracted a great deal of attention recently due to the introduction of wireless networks. Although several localization algorithms and systems have been implemented and discussed in the literature, very few researchers have exploited the gap that exists between indoor localization, tracking, external storage of location information and outdoor localization for the purpose of digital forensics during and after a disaster. The contribution of this paper lies in the implementation of a robust system that is capable of locating, tracking mobile device users and store location information for both indoor and partially outdoor the cloud. The system can be used during disaster to track and locate mobile phone users. The developed system is a mobile application built based on Android, Hypertext Preprocessor (PHP), Cascading Style Sheets (CSS), JavaScript and MATLAB for the Android mobile users. Using Waterfall model of software development, we have implemented a three level system that is able to track, locate and store mobile device information in secure database (cloud) on almost a real time basis. The outcome of the study showed that the developed system is efficient with regard to the tracking and locating mobile devices. The system is also flexible, i.e. can be used in any building with fewer adjustments. Finally, the system is accurate for both indoor and outdoor in terms of locating and tracking mobile devices.Keywords: indoor localization, digital forensics, fingerprinting, tracking and cloud
Procedia PDF Downloads 339298 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 165297 SockGEL/PLUG: Injectable Nano-Scaled Hydrogel Platforms for Oral and Maxillofacial Interventional Application
Authors: Z. S. Haidar
Abstract:
Millions of teeth are removed annually, and dental extraction is one of the most commonly performed surgical procedures globally. Whether due to caries, periodontal disease, or trauma, exodontia and the ensuing wound healing and bone remodeling processes of the resultant socket (hole in the jaw bone) usually result in serious deformities of the residual alveolar osseous ridge and surrounding soft tissues (reduced height/width). Such voluminous changes render the placement of a proper conventional bridge, denture, or even an implant-supported prosthesis extremely challenging. Further, most extractions continue to be performed with no regard for preventing the onset of alveolar osteitis (also known as dry socket, a painful and difficult-to-treat/-manage condition post-exodontia). Hence, such serious resorptive morphological changes often result in significant facial deformities and a negative impact on the overall Quality of Life (QoL) of patients (and oral health-related QoL); alarming, particularly for the geriatric with compromised healing and in light of the thriving longevity statistics. Despite advances in tissue/wound grafting, serious limitations continue to exist, including efficacy and clinical outcome predictability, cost, treatment time, expertise, and risk of immune reactions. For cases of dry socket, specifically, the commercially available and often-prescribed home remedies are highly-lacking. Indeed, most are not recommended for use anymore. Alveogyl is a fine example. Hence, there is a great market demand and need for alternative solutions. Herein, SockGEL/PLUG (patent pending), an innovative, all-natural, drug-free, and injectable thermo-responsive hydrogel, was designed, formulated, characterized, and evaluated as an osteogenic, angiogenic, anti-microbial, and pain-soothing suture-free intra-alveolar dressing, safe and efficacious for use in fresh extraction sockets, immediately post-exodontia. It is composed of FDA-approved, biocompatible and biodegradable polymers, self-assembled electro-statically to formulate a scaffolding matrix to (1) prevent the on-set of alveolar osteitis via securing the fibrin-clot in situ and protecting/sealing the socket from contamination/infection; and (2) endogenously promote/accelerate wound healing and bone remodeling to preserve the volume of the alveolus. The intrinsic properties of the SockGEL/PLUG hydrogel were evaluated physical-chemical-mechanically for safety (cell viability), viscosity, rheology, bio-distribution, and essentially, capacity to induce wound healing and osteogenesis (small defect, in vivo) without any signaling cues from exogenous cells, growth factors or drugs. The proposed animal model of cranial critical-sized and non-vascularized bone defects shall provide new and critical insights into the role and mechanism of the employed natural bio-polymer blend and gel product in endogenous reparative regeneration of soft tissues and bone morphogenesis. Alongside, the fine-tuning of our modified formulation method will further tackle appropriateness, reproducibility, scalability, ease, and speed in producing stable, biodegradable, and sterilizable thermo-sensitive matrices (3-dimensional interpenetrating yet porous polymeric network) suitable for the intra-socket application. Findings are anticipated to provide sufficient evidence to translate into pilot clinical trials and validate the innovation before engaging the market for feasibility, acceptance, and cost-effectiveness studies.Keywords: hydrogel, nanotechnology, bioengineering, bone regeneration, nanogel, drug delivery
Procedia PDF Downloads 114296 Revisiting the Surgical Approaches to Decompression in Quadrangular Space Syndrome: A Cadaveric Study
Authors: Sundip Charmode, Simmi Mehra, Sudhir Kushwaha, Shalom Philip, Pratik Amrutiya, Ranjna Jangal
Abstract:
Introduction: Quadrangular space syndrome involves compression of the axillary nerve and posterior circumflex humeral artery and its management in few cases, requires surgical decompression. The current study reviews the surgical approaches used in the decompression of neurovascular structures and presents our reflections and recommendations. Methods: Four human cadavers, in the Department of Anatomy were used for dissection of the Axillae and the Scapular region by the senior residents of the Department of Anatomy and Department of Orthopedics, who dissected quadrangular space in the eight upper limbs, using anterior and posterior surgical approaches. Observations: Posterior approach to identify the quadrangular space and secure its contents was recognized as the easier and much quicker method by both the Anatomy and Orthopedic residents, but it may result in increased postoperative morbidity. Whereas the anterior (Delto-pectoral) approach involves more skill but reduces postoperative morbidity. Conclusions: Anterior (Delto-pectoral) approach with suggested modifications can prove as an effective method in surgical decompression of quadrangular space syndrome. The authors suggest more cadaveric studies to facilitate anatomists and surgeons with the opportunities to practice and evaluate older and newer surgical approaches.Keywords: surgical approach, anatomical approach, decompression, axillary nerve, quadrangular space
Procedia PDF Downloads 173295 Attachment Patterns in a Sample of South African Children at Risk in Middle Childhood
Authors: Renate Gericke, Carol Long
Abstract:
Despite the robust empirical support of attachment, advancement in the description and conceptualization of attachment has been slow and has not significantly advanced beyond the identification of attachment security or type (namely, secure, avoidant, ambivalent and disorganized). This has continued despite papers arguing for theoretical refinement in the classification of attachment presentations. For thinking and practice to advance, it is critically important that these categories and their assessment be interrogated in different contexts and across developmental age. To achieve this, a quantitative design was used with descriptive and inferential statistics, and general linear models were employed to analyze the data. The Attachment Story Completion Test (ASCT) was administered to 105 children between the ages of eight and twelve from socio-economically deprived contexts with high exposure to trauma. A staggering 93% of the children had insecure attachments (specifically, avoidant 37%, disorganized 34% and ambivalent 22%) and attachment was more complex than currently conceptualized in the attachment literature. Primary attachment did not only present as one of four discreet categories, but 70% of the sample had a complex attachment with more than one type of maternal attachment style. Attachment intensity also varied along a continuum (between 1 and 5). The findings have implications for a) research that has not considered the potential complexity of attachment or attachment intensity, b) policy to more actively support mother-infant dyads, particularly in high-risk contexts and c) question the applicability of a western conceptualization of a primary maternal attachment figure in non-western collectivist societies.Keywords: attachment, children at risk, middle childhood, non-western context
Procedia PDF Downloads 194294 Securitization of Illegal Fishing Cases in Natuna Waters by Indonesian Government: Study Case of Chinese Vessels Shootouts 2016
Authors: Ray Maximillian, Idil Syawfi
Abstract:
Indonesia’s Exclusive Economic Zone and the infamous China’s nine-dash line are intersected in Natuna waters. Even though from Indonesia perspective, that line does not possess any legal basis, China treat that line as their national boundaries, therefore allowing Chinese fishermen to fish in the area. Under President Joko Widodo leadership, Indonesia which now focusing to suppress illegal fishing cases while emphasizing their maritime sovereignty is facing an imminent threat from China’s presence in Natuna. Tension between these countries spiked after three incident happened on 2016, especially after Indonesian navy shot Chinese fishermen vessel that suspected doing illegal fishing activity. This action seen as an attempt to secure Indonesia’s law enforcement in their waters after several months before such attempt was intervened by Chinese coast guard. Indonesia tries to securitize this issue to justify the shooting they done to Chinese vessels. In the process of securitization, it is imperative to identify the existential threat that leads to implementation of emergency measures which responded by units in the cases. Chinese coast guard presence in Natuna perceived as an existential threat to Indonesia, therefore, responded by shooting to Chinese vessels on the next encounter. This action then responded by Chinese government who said that there is overlapping claim between them and Indonesia in Natuna.Keywords: China, illegal fishing, Indonesia, natuna, securitization
Procedia PDF Downloads 216293 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector
Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar
Abstract:
Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake
Procedia PDF Downloads 138292 Arbitration in Foreign Investment: The Need for Equitable Treatment between the Investor and the Host State
Authors: Maria João Mimoso, Bárbara Magalhães Bravo
Abstract:
This study aims to analyse the phenomenon of arbitration as a paradigm in solving emerging controversies of foreign investment. We will present their benefits and demonstrate their contribution to greater legal certainty in economic relations. This article explores the legal relevant concepts under a strictly conceptual methodology, preparing future research to be developed under more developed comparative law methodologies. The review of national and international literature and jurisprudence will reveal the importance of arbitration in the field of international economic relations, presenting it as an alternative dispute resolution. Globalization imposes new forms of investment protection and appeals to other forms of dispute settlement, primarily to prevent, among other problems, the possible bias of the recipient country's investment tribunals. Characterization of foreign investment, its regulatory sources, their characteristics and the need for intervention of an entity capable of resolving disputes between the parties involved: State investor reception; Investor (of a nationality other than the latter); State of the investor's nationality, and sometimes a ‘subsidiary’ local foreign investor. The ICSID (International Settlement of Investment Disputes) arbitration as a means of resolving investment litigations covered by bilateral treaties (BIT) and investment contracts calls for a delimitation of these two figures in order to clarify the scope of the arbitration under the aegis of the World Bank and to make it more secure in the view of the sovereign power of the States.Keywords: arbitration, contract, foreign, investment, disputes
Procedia PDF Downloads 270291 Lockit: A Logic Locking Automation Software
Authors: Nemanja Kajtez, Yue Zhan, Basel Halak
Abstract:
The significant rise in the cost of manufacturing of nanoscale integrated circuits (IC) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. This multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat that, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches is rather slow due to the lack of the integration with IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist and can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile in trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions. The source code of this tool is available freely from (https://www.researchgate.net/publication/353195333_Source_Code_for_The_Lockit_Tool).Keywords: design automation, hardware security, IP piracy, logic locking
Procedia PDF Downloads 186290 Destination Port Detection For Vessels: An Analytic Tool For Optimizing Port Authorities Resources
Authors: Lubna Eljabu, Mohammad Etemad, Stan Matwin
Abstract:
Port authorities have many challenges in congested ports to allocate their resources to provide a safe and secure loading/ unloading procedure for cargo vessels. Selecting a destination port is the decision of a vessel master based on many factors such as weather, wavelength and changes of priorities. Having access to a tool which leverages AIS messages to monitor vessel’s movements and accurately predict their next destination port promotes an effective resource allocation process for port authorities. In this research, we propose a method, namely, Reference Route of Trajectory (RRoT) to assist port authorities in predicting inflow and outflow traffic in their local environment by monitoring Automatic Identification System (AIS) messages. Our RRoT method creates a reference route based on historical AIS messages. It utilizes some of the best trajectory similarity measure to identify the destination of a vessel using their recent movement. We evaluated five different similarity measures such as Discrete Fr´echet Distance (DFD), Dynamic Time Warping (DTW), Partial Curve Mapping (PCM), Area between two curves (Area) and Curve length (CL). Our experiments show that our method identifies the destination port with an accuracy of 98.97% and an fmeasure of 99.08% using Dynamic Time Warping (DTW) similarity measure.Keywords: spatial temporal data mining, trajectory mining, trajectory similarity, resource optimization
Procedia PDF Downloads 122289 Designing the First Oil Tanker Shipyard Facility in Kuwait
Authors: Fatma Al Abdullah, Shahad Al Ameer, Ritaj Jaragh, Fatimah Khajah, Rawan Qambar, Amr Nounou
Abstract:
Kuwait currently manufactures its tankers in foreign countries. Oil tankers play a role in the supply chain of the oil industry. Therefore, with Kuwait’s sufficient financial resources, the country should secure itself strategically in order to protect its oil industry to sustain economic development. The purpose of this report is designing an oil tankers’ shipyard facility. Basing the shipyard facility in Kuwait will have great economic rewards. The shipbuilding industry directly enhances the industrial chain in terms of new job and business opportunities as well as educational fields. Heavy Engineering Industries & Shipbuilding Co. K.S.C. (HEISCO) was chosen as a host due to benefits that will result from HEISCO’s existing infrastructure and expertise to reduce cost. The Facility Design methodology chosen has been used because it covers all aspects needed for the report. The oil tanker market is witnessing a shift from crude tankers to product tankers. Therefore the Panamax tanker (product tanker) was selected to be manufactured in the facility. The different departments needed in shipyards were identified based on studying different global shipyards. Technologies needed to build ships helped in the process design. It was noticed that ships are engineer to order. The new layout development of the proposed shipyard is currently in progress. A feasibility study will be conducted to ensure the success of the facility after developing the shipyard’s layout.Keywords: oil tankers, shipbuilding, shipyard, facility design, Kuwait
Procedia PDF Downloads 467