Search results for: IoT security architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4426

Search results for: IoT security architecture

3976 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework

Authors: Husnil Khatimah, Fairol Halim

Abstract:

This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.

Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper

Procedia PDF Downloads 452
3975 Linkages Between Climate Change, Agricultural Productivity, Food Security and Economic Growth

Authors: Jihène Khalifa

Abstract:

This study analyzed the relationships between Tunisia’s economic growth, food security, agricultural productivity, and climate change using the ARDL model for the period from 1990 to 2022. The ARDL model reveals a positive correlation between economic growth and lagged agricultural productivity. Additionally, the vector autoregressive (VAR) model highlights the beneficial impact of lagged agricultural productivity on economic growth and the negative effect of rainfall on economic growth. Granger causality analysis identifies unidirectional relationships from economic growth to agricultural productivity, crop production, food security, and temperature variations, as well as from temperature variations to crop production. Furthermore, a bidirectional causality is established between crop production and food security. The study underscores the impact of climate change on crop production and suggests the need for adaptive strategies to mitigate these climate effects.

Keywords: economic growth, agriculture, food security, climate change, ARDl, VAR

Procedia PDF Downloads 30
3974 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: electricity, energy policy, energy security, Malaysia

Procedia PDF Downloads 304
3973 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 321
3972 Influences on the Evolution of Le Corbusier's Early Work

Authors: Parima Kotanut

Abstract:

It is commonly known that Le Corbusier, a pivotal figure in modern architecture, developed a diverse range of architectural languages. Due to his emblematic work of the International Style has become a central focus in architectural education and historiography, many scholars have redirected their attention to the architect's formative years and early career. One of the significant contributions to this is the treatise titled Le Corbusier before Le Corbusier: Applied Arts, Architecture, Painting, Photography, 1907-1922, published in conjunction with an exhibition in Switzerland in 2002, aiming to provide an extensive catalog of Le Corbusier's personal life, the societal contexts he engaged with, and his artistic pursuits. While the publication offers profound insights into the experiences and ideologies that shaped his early works, it only partially addresses the influence of those formative ideas on his later practice. This raises a question regarding the long-term impact of his early experiences as Charles-Edouard Jeanneret upon his later practice as Le Corbusier. The research aims to re-examine theoretical frameworks proposed by Le Corbusier and other scholars in juxtaposition to his built works, correspondences, and artistic persona. Although there are several milestones shaping Le Corbusier's works, through historical research, the paper is divided into three categories: 1911 "Voyage d'Orient", the immersion in the technology of reinforced concrete, and the participation in the Parisian art world. These three experiences serve as a foundation for his lifetime theories concerning function, construction, and form of architecture, demonstrating how experiences beyond the architectural domain are critical to the design of buildings. Furthermore, this study intends to illuminate the contributions of lesser-known figures who consistently influenced Le Corbusier's passionate journey toward his architectural identity.

Keywords: architecture, Le Corbusier, 20th century architecture, modern architecture

Procedia PDF Downloads 10
3971 Slowness in Architecture: The Pace of Human Engagement with the Built Environment

Authors: Jaidev Tripathy

Abstract:

A human generation’s lifestyle, behaviors, habits, and actions are governed heavily by homogenous mindsets. But the current scenario is witnessing a rapid gap in this homogeneity as a result of an intervention, or rather, the dominance of the digital revolution in the human lifestyle. The current mindset for mass production, employment, multi-tasking, rapid involvement, and stiff competition to stay above the rest has led to a major shift in human consciousness. Architecture, as an entity, is being perceived differently. The screens are replacing the skies. The pace at which operation and evolution is taking place has increased. It is paradoxical, that time seems to be moving faster despite the intention to save time. Parallelly, there is an evident shift in architectural typologies spanning across different generations. The architecture of today is now seems influenced heavily from here and there. Mass production of buildings and over-exploitation of resources giving shape to uninspiring algorithmic designs, ambiguously catering to multiple user groups, has become a prevalent theme. Borrow-and-steal replaces influence, and the diminishing depth in today’s designs reflects a lack of understanding and connection. The digitally dominated world, perceived as an aid to connect and network, is making humans less capable of real-life interactions and understanding. It is not wrong, but it doesn’t seem right either. The engagement level between human beings and the built environment is a concern which surfaces. This leads to a question: Does human engagement drive architecture, or does architecture drive human engagement? This paper attempts to relook at architecture's capacity and its relativity with pace to influence the conscious decisions of a human being. Secondary research, supported with case examples, helps in understanding the translation of human engagement with the built environment through physicality of architecture. The procedure, or theme, is pace and the role of slowness in the context of human behaviors, thus bridging the widening gap between the human race and the architecture themselves give shape to, avoiding a possible future dystopian world.

Keywords: junkspace, pace, perception, slowness

Procedia PDF Downloads 108
3970 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 28
3969 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 427
3968 Factors Affecting the Formation of Architectural Space and Construction Systems in the Jordanian Vernacular Architecture

Authors: Mohannad Tarrad

Abstract:

The research deals with the beginnings of the vernacular Jordanian architecture since the establishment of the Jordanian state in the early nineteenth century until now, where the Jordanian architecture was based on the interactions of the Jordanian society with the surrounding environment, where the local materials available in the construction area were used, and the construction systems inherited from previous civilizations were used. The builders in Jordan relied on exchanging knowledge and transferring it from one generation to another, where they were able to formulate a construction style capable of responding to the requirement of architectural spaces, and each region of Jordan has its own way of building, as there are various geographical areas in Jordan, including agricultural, mountainous and desert areas. Then the research touched on a historical study of the architectural space and identifying the value of the architectural space in the Jordanian social life, which is related to the customs and traditions of a society influenced by the Arab Islamic civilization, and then the construction, the structural structure, its characteristics and the constituent elements of the building were defined in the vernacular l Jordanian architecture. From the structural point of view, and then to identify the structural materials used in the structural structure and the impact of the structural structure on the design from several aspects, leading to the interior space and the factors affecting it. The research aims to explain and clarify the interconnected design and construction solutions in the vernacular Jordanian architecture in a manner that respects the environmental context, taking into account the material cost of the building, where the financial situation of the home owner plays an important role in choosing the building material and construction method. Case studies from heritage buildings from several Jordanian regions will be analyzed to illustrate the idea of the research.

Keywords: construction systems, architectural space, environmental context, Jordanian architecture

Procedia PDF Downloads 202
3967 Comparative Analysis of Identity Semiotics in Iran’s Modern and Traditional House Design

Authors: Maryam Ghasemi

Abstract:

One of the most significant components that provide comfort and protection is having a shelter called a house. Even if components and regions are changed or restored to meet new functions, the house's identity must be preserved. In the contemporary era, houses are increasingly being built regardless of cultural identity. This misunderstanding caused a sense of unease. This study analyses archaic and modern architecture to find semiotic areas and qualities in the latter, using the former as a reference. This study's technique used an exploratory assessment of architectural components from both periods. The Abbasid residence and the Ekbatan architectural complex were used as case studies. The identity of Iranian architecture does not correlate with current buildings. The other part is privacy, which is a missing link between traditional and modern Iranian architecture because it is directly related to the identities of homes based on the cultures of their residents.

Keywords: housing, traditional, contemporary, privacy, semiotic

Procedia PDF Downloads 104
3966 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 118
3965 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 82
3964 A Graph Library Development Based on the Service-‎Oriented Architecture: Used for Representation of the ‎Biological ‎Systems in the Computer Algorithms

Authors: Mehrshad Khosraviani, Sepehr Najjarpour

Abstract:

Considering the usage of graph-based approaches in systems and synthetic biology, and the various types of ‎the graphs employed by them, a comprehensive graph library based ‎on the three-tier architecture (3TA) was previously introduced for full representation of the biological systems. Although proposing a 3TA-based graph library, three following reasons motivated us to redesign the graph ‎library based on the service-oriented architecture (SOA): (1) Maintaining the accuracy of the data related to an input graph (including its edges, its ‎vertices, its topology, etc.) without involving the end user:‎ Since, in the case of using 3TA, the library files are available to the end users, they may ‎be utilized incorrectly, and consequently, the invalid graph data will be provided to the ‎computer algorithms. However, considering the usage of the SOA, the operation of the ‎graph registration is specified as a service by encapsulation of the library files. In other words, overall control operations needed for registration of the valid data will be the ‎responsibility of the services. (2) Partitioning of the library product into some different parts: Considering 3TA, a whole library product was provided in general. While here, the product ‎can be divided into smaller ones, such as an AND/OR graph drawing service, and each ‎one can be provided individually. As a result, the end user will be able to select any ‎parts of the library product, instead of all features, to add it to a project. (3) Reduction of the complexities: While using 3TA, several other libraries must be needed to add for connecting to the ‎database, responsibility of the provision of the needed library resources in the SOA-‎based graph library is entrusted with the services by themselves. Therefore, the end user ‎who wants to use the graph library is not involved with its complexity. In the end, in order to ‎make ‎the library easier to control in the system, and to restrict the end user from accessing the files, ‎it was preferred to use the service-oriented ‎architecture ‎‎(SOA) over the three-tier architecture (3TA) and to redevelop the previously proposed graph library based on it‎.

Keywords: Bio-Design Automation, Biological System, Graph Library, Service-Oriented Architecture, Systems and Synthetic Biology

Procedia PDF Downloads 310
3963 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur

Authors: Sandra Thomas

Abstract:

This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.

Keywords: food security, dietary diversity, household level, socio-economic classes

Procedia PDF Downloads 124
3962 Analyzing the Impact of Indian Architecture on the Architecture of Cambodia, Thailand and Indonesia

Authors: Sriranjani Srinivasan

Abstract:

To appreciate Indian art and architecture by studying it in India alone will only lead to partial understanding of the whole story and the variety of the statement has been amply proved by subsequent decades of patient research. The results of the work of the Archaeological Survey of India forms only one half of the picture, the other half emerges with the studies of the archaeology and art of the Far East that progressed almost simultaneously under the Archaeological Survey of the Dutch East Indies, the École française d'Extrême-Orient (EFEO), or French School of Asian Studies, and allied institutions. The conclusions arrived at have only rendered the assertion that India produced her ultimate master pieces only through foreign influences and in foreign lands (the South-Eastern peninsular and archipelagic regions) almost axiomatic. Angkor in Cambodia and Borobudur in Java, undoubtedly the two greatest architectural marvels of Indian genius, for in content and spirit these (and other monuments of varying magnitudes), are purely Indian, would well illustrate the statement mentioned earlier. Stimulated research followed the discoveries and among the many studies and publications of such pioneers like Coedes, Parmentier, Coomaraswamy and many others in Dutch, French and English made growing contributions to the subject. This paper will discuss in detail the impact of India on the architecture of South East Asia by detailed comparison of architectural styles, elements, and construction materials of a few specific architectural master pieces, in both India and South East Asian countries. It will also analyze the reasoning behind the influence of India on South East Asian countries in spite of them being exposed to the equally culturally rich and civilized kingdoms of China. The intention of this paper is to understand that, conquest by war is not always the only reason for architectural influences and impacts.

Keywords: architectural influence, Buddhist architecture, Indian architecture, Southeast Asian architecture

Procedia PDF Downloads 306
3961 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 299
3960 Earth Flat Roofs

Authors: Raúl García de la Cruz

Abstract:

In the state of Hidalgo and to the vicinity to the state of Mexico, there is a network of people who also share a valley bordered by hills with agave landscape of cacti and shared a bond of building traditions inherited from pre-Hispanic times and according to their material resources, habits and needs have been adapted in time. Weather has played an important role in the way buildings and roofs are constructed. Throughout the centuries, the population has developed very sophisticated building techniques like the flat roof, made out of a layer of earth; that is usually identified as belonging to architecture of the desert, but it can also be found in other climates, such as semi-arid and even template climates. It is an example of a constructive logic applied efficiently to various cultures proving its thermal isolation. So far it has done a review and analysis of the use of the roof in different areas, from pre-Hispanic architecture to traditional Moroccan architecture , finding great similarities in the elements of the system to be incorporated into the contemporary architecture. The rescue of a lore that dissolves with the changing environment, depends in principle on the links created towards the use of environmental resources as the anchor of the people to retain and preserve a building tradition which has viability deep league with the possibility of obtaining the raw material from the immediate environment. The objective of the research is the documentation of existing earth flat roofs in the state of Hidalgo and Mexico, as evidence of the importance of constructive system and its historical value in the area, considering its environmental, social aspects, also understanding the process of transformation of public housing at the time replaced the traditional techniques for industrial materials on a path towards urbanization. So far it has done a review and analysis of the use of the roof in different areas, from pre-Hispanic architecture to traditional Moroccan architecture, finding great similarities in the elements of the system to be incorporated into the contemporary architecture. The rescue of a lore that dissolves with the changing environment, depends in principle on the links created towards the use of environmental resources as the anchor of the people to retain and preserve a building tradition which has viability deep league with the possibility of obtaining the raw material from the immediate environment.

Keywords: earth roof, low impact building system, sustainable architecture, vernacular architecture

Procedia PDF Downloads 456
3959 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 73
3958 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 289
3957 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 299
3956 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 429
3955 How Sustainable is Tourism Architecture in Uganda

Authors: Goodman Conrad Kazoroa

Abstract:

Among the most remarkable socioeconomic phenomena of the post-World War II era has been the expansion of the global tourism industry. Intensifying tourism activity is continuing to affect more and more places and there can no longer be any doubt as to the potential of this sector to affect fundamental economic, social-cultural and environmental change. A phenomenon with far reaching effects like this needs to be carefully controlled and planned so as not to compromise the chances for the future generations to enjoy this resource, therefore the issue of tourism sustainability, as a result, is unveiled. The concept of sustainable tourism remains vague in Uganda as the country has seen an increase in resorts, hotels and lodges especially in most of Uganda’s ecologically vulnerable areas National Parks. To many, sustainable tourism it is merely the application of the sustainable development idea to the sector of tourism. To others, it is the conservation of the environment and its natural resources, realising and appropriately using them to achieve sustainable built environments that promote tourism. Architecture and the built environment can be the first means to link the global dimension of this phenomenon of sustainable tourism to its local implications. The aim of this paper was to critically analyse the extent to which sustainability related considerations have been pursued in the built environments for Uganda’s national parks as means to achieving sustainable tourism. This was achieved by use of a sustainable architecture rating tool that was modified to fit Uganda’s context. The results of this are presented as the final results of the study. There are many examples of sustainable tourism resorts, or what tourism managers and developers claim are sustainable tourism resorts throughout the country. This paper reveals the truth, that is, true sustainable tourism resorts are very few and far between.

Keywords: sustainable tourism, tourism architecture, sustainable architecture, sustainable tourism resorts

Procedia PDF Downloads 380
3954 Reducing Energy Consumption in Architectural Spaces by Optimizing Natural Light Transmission

Authors: Parisa Javid

Abstract:

In architecture, daylight contributes to humans' mental and physical well-being and reduces the consumption of fossil fuels. Accordingly, Iran's rich architecture has valuable achievements and experiences that should be recognized and introduced to the Iranian and international architecture communities. There are many ways to reduce energy consumption in buildings, but electricity accounts for a large part of that consumption. Lighting up spaces with natural light is a significant factor in reducing energy consumption and preventing electricity dissipation. Aside from being expensive, electric lighting systems cause excessive heat and physical injury (eyes). This study is based on library records and documents. Modern lighting systems are used to reduce energy consumption in the interior of a building to allow for optimal transmission of natural light. It discusses how to use natural light in architecture and the benefits of natural light in buildings. Solar energy can be used more efficiently, and electrical power can be saved in residential, administrative, commercial, and educational buildings by using new methods such as light tubes and mirror directors. Modern lighting systems, natural light, and reduced energy consumption are keywords for these systems, which quickly return their investment.

Keywords: modern lighting systems, natural light, reduced energy consumption

Procedia PDF Downloads 96
3953 Internal Evaluation of Architecture University Department in Architecture Engineering Bachelor's Level: A Case from Iran

Authors: Faranak Omidian

Abstract:

This study has been carried out to examine the status of architecture department at bachelor's level of engineering architecture in Islamic Azad University of Dezful in 2012-13 academic year. The present research is a descriptive cross sectional study and in terms of measurement, it is descriptive and analytical, which was done based on 7 steps and in 7 areas with 32 criteria and 169 indicators. The sample includes 201 students, 14 faculty members, 72 graduates and 39 employers. Simple random sampling method, complete enumeration method, network sampling (snowball sampling) were used for students, faculty members and graduates respectively. All sample responded to the questions. After data collection, the findings were ranked on Likert scale from desirable to undesirable with the scores ranging from 1 to 3.The results showed that the department with a score of 1.88 in regard to objectives, organizational status, management and organizations, with a score of 2 in relation to students, with a score of 1.8 in regard to faculty members was in a relatively desirable status. Regarding training courses and curriculum, it gained a score of 2.33 which indicates the desirable status of the department in this regard. It gained scores of 1.75, 2, and 1.8 with respect to educational and research facilities and equipment, teaching and learning strategies, and graduates respectively, all of which shows the relatively desirable status of the department. The results showed that the department of architecture, with an average score of 2.14 in all evaluated areas, was in a desirable situation. Therefore, although the department generally has a desirable status, it needs to put in more effort to tackle its weaknesses and shortages and corrects its defects in order to promote educational quality, taking to the desirable level.

Keywords: internal evaluation, architecture department in Islamic, Azad University, Dezful

Procedia PDF Downloads 442
3952 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 329
3951 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 402
3950 An Approach to Analyze Testing of Nano On-Chip Networks

Authors: Farnaz Fotovvatikhah, Javad Akbari

Abstract:

Test time of a test architecture is an important factor which depends on the architecture's delay and test patterns. Here a new architecture to store the test results based on network on chip is presented. In addition, simple analytical model is proposed to calculate link test time for built in self-tester (BIST) and external tester (Ext) in multiprocessor systems. The results extracted from the model are verified using FPGA implementation and experimental measurements. Systems consisting 16, 25, and 36 processors are implemented and simulated and test time is calculated. In addition, BIST and Ext are compared in terms of test time at different conditions such as at different number of test patterns and nodes. Using the model the maximum frequency of testing could be calculated and the test structure could be optimized for high speed testing.

Keywords: test, nano on-chip network, JTAG, modelling

Procedia PDF Downloads 486
3949 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 152
3948 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 95
3947 Present-Day Transformations and Trends in Rooftop Agriculture and Food Security

Authors: Kiara Lawrence, Nadine Ponnusamy, Clive Greenstone

Abstract:

One of the major challenges facing society today is food security. The risks to food security have increased significantly due to the evolving urban landscape, globalization, and a rising population. The cultivation of food is essential, particularly during times of crisis, such as a recession, and has long been a necessity for urban populations. In contemporary society, many urban residents are confronted with new challenges, including high levels of unemployment, which compel individuals to adopt alternative survival strategies, such as growing their own food. Recently, rooftop agriculture has made significant contributions to urban and national food security and has been utilized as a tool to mitigate the frequent and damaging disasters that many cities encounter. They have the potential to transform unused spaces into green, productive vegetable plots, while also providing urban residents with the opportunity to enjoy the benefits of gardening. Therefore, this study looks to investigate the evolving themes around rooftop agriculture and food security globally. A bibliometric review analysis was carried out on Scopus and Web of Science using the keywords “rooftop agriculture” OR “rooftop farming” OR “rooftop garden” AND “food security” between 2004 and 2024 to ensure a broader scope was covered around the chosen study. Vosviewer software was then utilized to analyze the extracted data to create network visualization maps based on keyword occurrences, co-author analysis, country analysis. There were only 37 relevant documents within the study parameters. Preliminary results indicate that much research focused on urban agriculture, food supply, green roof, sustainability and climate change. By analysing these aspects of rooftop agriculture and food security, the trends can identify gaps in literature and dictate future applications to assist in food security.

Keywords: food security, rooftop agriculture, rooftop farming, rooftop garden

Procedia PDF Downloads 15