Search results for: microwave security system
19418 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems
Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi
Abstract:
The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks
Procedia PDF Downloads 35519417 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 43719416 High Electrochemical Performance of Electrode Material Based On Mesoporous RGO@(Co,Mn)3O4 Nanocomposites
Authors: Charmaine Lamiel, Van Hoa Nguyen, Deivasigamani Ranjith Kumar, Jae-Jin Shim
Abstract:
The quest for alternative sources of energy storage had led to the exploration on supercapacitors. Hybrid supercapacitors, a combination of carbon-based material and transition metals, had yielded long and improved cycle life as well as high energy and power densities. In this study, microwave irradiation was used for the facile and rapid synthesis of mesoporous RGO@(Co,Mn)3O4 nanosheets as an active electrode material. The advantages of this method include the non-use of reducing agents and acidic medium, and no further post-heat treatment. Additionally, it offers shorter reaction time at low temperature and low power requirement, which allows low fabrication and energy cost. The as-prepared electrode material demonstrated a high capacitance of 953 F•g−1 at 1 A•g−1 in a 6 M KOH electrolyte. Furthermore, the electrode exhibited a high energy density of 76.2 Wh•kg−1 (power density of 720 W•kg−1) and a high power density of 7200 W•kg−1 (energy density of 38 Wh•kg−1). The successful synthesis was considered to be efficient and cost-effective, with very promising electrochemical performance that can be used as an active material in supercapacitors.Keywords: cobalt manganese oxide, electrochemical, graphene, microwave synthesis, supercapacitor
Procedia PDF Downloads 35819415 A Study on Abnormal Behavior Detection in BYOD Environment
Authors: Dongwan Kang, Joohyung Oh, Chaetae Im
Abstract:
Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies
Procedia PDF Downloads 32519414 The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria
Authors: Kaltume Kabir Sharrif
Abstract:
Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others.Keywords: transformation, security challenges, teacher education, educational psychology
Procedia PDF Downloads 50919413 Dual-Band Microwave Metamaterial Absorber Using Modified Circular Ring Resonator for Sensor Applications
Authors: Ramesh Amugothu, Vakula Damera, Narasimha Sarma N. V. S.
Abstract:
This study presents a dual-band metamaterial microwave absorber that functions at frequencies of 3.5 GHz and 5.7 GHz. The design comprises modified ring and rectangular patch resonators fabricated on an FR4 dielectric substrate with a ground layer beneath it, emphasizing simplicity. Each absorption frequency is independent and can be individually adjusted by altering the dimensions of the respective resonator structures. The unit cell of the absorber is simulated and optimized parametrically using high-frequency structure simulator (HFSS) software. The mechanism behind the absorption is examined through surface current analysis as well as the symmetric model method. The absorber demonstrates over 97% absorption at both resonant frequencies and is shown to be suitable for sensing applications related to dielectric constant measurement. With its straightforward design, wide-angle acceptance, and polarization-insensitive characteristics, the proposed absorber is likely to be beneficial for both absorption and sensing purposes.Keywords: absorption, dielectric permittivity, metamaterials, metasurfaces, resonant structures, sensor devices
Procedia PDF Downloads 1219412 Smart Grids Cyber Security Issues and Challenges
Authors: Imen Aouini, Lamia Ben Azzouz
Abstract:
The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.Keywords: smart grids, smart meters, home area network, neighbor area network
Procedia PDF Downloads 42519411 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme
Authors: Cavidan Yakupoglu, Kurt Rohloff
Abstract:
In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE
Procedia PDF Downloads 16319410 Blockchain-Based Decentralized Architecture for Secure Medical Records Management
Authors: Saeed M. Alshahrani
Abstract:
This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms
Procedia PDF Downloads 5619409 An Easy-Applicable Method for In situ Silver Nanoparticles Preparation into Wool Fibers
Authors: Salwa Mowafi, Mohamed Rehan, Hany Kafafy
Abstract:
In this study, three different systems including room temperature, conventional water bath heating and microwave irradiation technique will be employed in the fabrication of silver nanoparticle-wool fibers. The silver nanoparticles will be synthesized in-situ incorporated into wool fibers under redox active bio-template of wool protein which facilitates the reduction of Ag+ to nanoparticulate Ag0. Silver NPs incorporated wool fiber will be characterized by scanning electron microscopy, energy dispersive X-ray, FTIR, TGA, silver content and X-ray photoelectron spectroscopy. The mechanism of binding Ag NPs in-situ incorporated wool fibers matrix will be discussed. The effect of silver nanoparticles on the coloration, antimicrobial, UV-protection and catalytic properties of the wool fibers will be evaluated. The overall results of this study indicate that the Ag NPs in-situ incorporated wool fibers will be applied as colorants for wool fibers with improving in its multi-functionality properties. So, this study provides a simple approach for innovative protein fibers design by applying the optical properties of Plasmonic noble metal nanoparticles.Keywords: microwave irradiation technique, multi-functionality properties, silver nanoparticles, wool fibers
Procedia PDF Downloads 20719408 Design of a Novel CPW Fed Fractal Antenna for UWB
Authors: A. El Hamdouni, J. Zbitou, A. Tajmouati, L. El Abdellaoui, A. Errkik, A. Tribak, M. Latrach
Abstract:
This paper presents a novel fractal antenna structure proposed for UWB (Ultra – Wideband) applications. The frequency band 3.1-10.6 GHz released by FCC (Federal Communication Commission) as the commercial operation of UWB has been chosen as frequency range for this antenna based on coplanar waveguide (CPW) feed and circular shapes fulfilled according to fractal geometry. The proposed antenna is validated and designed by using an FR4 substrate with overall area of 34 x 43 mm2. The simulated results performed by CST-Microwave Studio and compared by ADS (Advanced Design System) show good matching input impedance with return loss less than -10 dB between 2.9 GHz and 11 GHz.Keywords: Fractal antenna, Fractal Geometry, CPW Feed, UWB, FCC
Procedia PDF Downloads 38819407 Effect of Pretreatment and Drying Method on Selected Quality Parameters of Dried Bell Pepper
Authors: Toyosi Yewande Tunde-Akintunde, Grace Oluwatoyin Ogunlakin, Bosede Folake Olanipekun
Abstract:
Peppers are excellent sources of nutrients but its high moisture content makes it susceptible to spoilage. Drying, a common processing method, results in a reduction of these nutrients in the final product. Pre-treatment of pepper before drying can be used to reduce the level of degradation of nutrients. Thus this study investigated the effect of pre-treatment (hot water blanching and soaking in brine-sodium chloride) and drying methods (oven, microwave and sun) on selected quality parameters (proximate composition, capsaicin, reducing sugar and phenolic content, pH, total solid (TS), Titratable acidity (TA), water absorption capacity (WAC) and colour) of pepper. The protein and moisture content value ranged from 9.09 to 10.23% and 5.63 to 8.48% respectively. Sun dried samples had the highest value while oven dried samples had the lowest. Brine treated samples had higher protein but lower moisture content than blanched samples. Capsaicin, reducing sugar and phenolic content values ranged from 0.68 to 0.87 mg/dm3; 3.18 to 3.79 µg/ml; and 40.67 to 84.01 mg GAE/100 g d.m respectively. The sun dried samples had higher values while the lowest values were from microwave dried samples. The brine treated samples had higher values in capsaicin while the blanched samples had higher reducing sugar and phenolic contents. The values of L, a* and b* for the dried pepper varied from 58.76 to 63.13; 7.09 to 7.34; and 11.79 to 12.36 respectively. Oven dried samples had the lowest values for a*, while its L values were the highest. The L and a* values for brine treated samples were higher than blanched samples. The pre-treatment and drying method considered resulted in different values of the quality parameters considered which indicates that drying and pre-treatment has an effect on the quality of the final dried pepper samples.Keywords: Bell pepper, microwave drying, oven drying, quality, sun drying
Procedia PDF Downloads 34719406 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model
Authors: Abdellahi Cheikh
Abstract:
With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard
Procedia PDF Downloads 9419405 A Blockchain-Based Privacy-Preserving Physical Delivery System
Authors: Shahin Zanbaghi, Saeed Samet
Abstract:
The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme
Procedia PDF Downloads 15019404 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 6919403 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World
Authors: Fehmeen Anwar, Ujala Liaqat
Abstract:
For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics
Procedia PDF Downloads 29519402 An Examination of the Effects of Implantable Technologies on the Practices of Governmentality
Authors: Benn Van Den Ende
Abstract:
Over the last three decades, there has been an exponential increase in developments in implantable technologies such as the cardiac pacemaker, bionic prosthesis, and implantable chips. The effect of these technologies has been well researched in many areas. However, there is a lack of critical research in security studies. This paper will provide preliminary findings to an ongoing research project which aims to examine how implantable technologies effect the practices of governmentality in the context of security. It will do this by looking at the practices and techniques of governmentality along with different implantable technologies which increase, change or otherwise affect governmental practices. The preliminary research demonstrates that implantable technologies have a profound effect on the practices of governmentality, while also paving the way for further research into a potential ‘new’ form of governmentality in relation to these implantable technologies.Keywords: critical security studies, governmentality, security theory, political theory, Foucault
Procedia PDF Downloads 19019401 Access Control System for Big Data Application
Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud
Abstract:
Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.Keywords: access control, security, Big Data, domain
Procedia PDF Downloads 13419400 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 12119399 Harnessing Entrepreneurial Opportunities for National Security
Authors: Itiola Kehinde Adeniran
Abstract:
This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment
Procedia PDF Downloads 33019398 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces
Authors: Emmanuel Mugiraneza
Abstract:
Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping
Procedia PDF Downloads 12619397 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment
Authors: Ritsuko Kawasaki, Takeshi Hiromatsu
Abstract:
Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization
Procedia PDF Downloads 38019396 Importance of Location Selection of an Energy Storage System in a Smart Grid
Authors: Vanaja Rao
Abstract:
In the recent times, the need for the integration of Renewable Energy Sources (RES) in a Smart Grid is on the rise. As a result of this, associated energy storage systems are known to play important roles in sustaining the efficient operation of such RES like wind power and solar power. This paper investigates the importance of location selection of Energy Storage Systems (ESSs) in a Smart Grid. Three scenarios of ESS location is studied and analyzed in a Smart Grid, which are – 1. Near the generation/source, 2. In the middle of the Grid and, 3. Near the demand/consumption. This is explained with the aim of assisting any Distribution Network Operator (DNO) in deploying the ESSs in a power network, which will significantly help reduce the costs and time of planning and avoid any damages incurred as a result of installing them at an incorrect location of a Smart Grid. To do this, the outlined scenarios mentioned above are modelled and analyzed with the National Grid’s datasets of energy generation and consumption in the UK power network. As a result, the outcome of this analysis aims to provide a better overview for the location selection of the ESSs in a Smart Grid. This ensures power system stability and security along with the optimum usage of the ESSs.Keywords: distribution networks, energy storage system, energy security, location planning, power stability, smart grid
Procedia PDF Downloads 30019395 Synthesis of Brominated Pyrazoline Derived from Chalcone and Its Antimicrobial Activity
Authors: Annisa I. Reza, Jasril Karim
Abstract:
Despite the availability of antimicrobial agents in the market, the urge to study and find other chemical compounds with the better potential of replacing them still tempting the scientists. This experiment is in the aim to explore a novel brominated pyrazoline ring which was made from intermediate chalcone as a candidate to answer the challenge. Using green chemistry approach by microwave irradiation from domestic oven, both known chalcone and 5-(2-bromophenyl)-3-(naphthalen-1-yl)-4,5-dihydro-1H-pyrazole were successfully synthesized. Pyrazoline’s structure was confirmed based on UV, IR, ¹H-NMR, ¹³C-NMR and MS and together with its intermediate were examined against some microorganisms (Bacillus subtilis, Escherichia coli, and Candida albicans) under agar diffusion method. The results collected during experiment revealed that both tested compounds showed weak activity on B.subtilis which was proven by a zone of inhibitions, while there was no zone of inhibitions observed in E. coli and C. albicans. This is suggested because of the bulky structure around pyrazoline could not provide the main ring to interact with microbial’s cell wall. The study shows that the proposed compound had the low capability as a promising antimicrobial agent, yet it still enriches the information about pyrazoline ring.Keywords: antimicrobial, chalcone, microwave irradiation, pyrazoline
Procedia PDF Downloads 15319394 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 40119393 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool
Authors: D. Subedi, S. Pradhan
Abstract:
Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics
Procedia PDF Downloads 41719392 The Importance of Fire Safety in Egypt
Authors: Omar Shakra
Abstract:
This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.Keywords: fire, system, protection, fire hydrants, security, alarms
Procedia PDF Downloads 11119391 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)
Authors: Wafa' Slaibi Alsharafat
Abstract:
Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection
Procedia PDF Downloads 47419390 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View
Authors: Olumide A. Fafore, Khondlo Mtshali
Abstract:
The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security
Procedia PDF Downloads 16519389 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 206