Search results for: security test institutionalization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11927

Search results for: security test institutionalization

11387 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study

Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly

Abstract:

In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.

Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions

Procedia PDF Downloads 82
11386 Current Status of 5A Lab6 Hollow Cathode Life Tests in Lanzhou Institute of Physics, China

Authors: Yanhui Jia, Ning Guo, Juan Li, Yunkui Sun, Wei Yang, Tianping Zhang, Lin Ma, Wei Meng, Hai Geng

Abstract:

The current statuses of lifetime test of LaB6 hollow cathode at the Lanzhou institute of physics (LIP), China, was described. 5A LaB6 hollow cathode was designed for LIPS-200 40mN Xenon ion thruster and it could be used for LHT-100 80 mN Hall thruster, too. Life test of the discharge and neutralizer modes of LHC-5 hollow cathode were stared in October 2011, and cumulative operation time reached 17,300 and 16,100 hours in April 2015, respectively. The life of cathode was designed more than 11,000 hours. Parameters of discharge and key structure dimensions were monitored in different stage of life test indicated that cathodes were health enough. The test will continue until the cathode cannot work or operation parameter is not in normally. The result of the endurance test of cathode demonstrated that the LaB6 hollow cathode is satisfied for the required of thruster in life and performance.

Keywords: LaB6, hollow cathode, thruster, lifetime test, electric propulsion

Procedia PDF Downloads 610
11385 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 481
11384 Horizontal-Vertical and Enhanced-Unicast Interconnect Testing Techniques for Network-on-Chip

Authors: Mahdiar Hosseinghadiry, Razali Ismail, F. Fotovati

Abstract:

One of the most important and challenging tasks in testing network-on-chip based system-on-chips (NoC based SoCs) is to verify the communication entity. It is important because of its usage for transferring both data packets and test patterns for intellectual properties (IPs) during normal and test mode. Hence, ensuring of NoC reliability is required for reliable IPs functionality and testing. On the other hand, it is challenging due to the required time to test it and the way of transferring test patterns from the tester to the NoC components. In this paper, two testing techniques for mesh-based NoC interconnections are proposed. The first one is based on one-by-one testing and the second one divides NoC interconnects into three parts, horizontal links of switches in even columns, horizontal links of switches in odd columns and all vertical. A design for testability (DFT) architecture is represented to send test patterns directly to each switch under test and also support the proposed testing techniques by providing a loopback path in each switch. The simulation results shows the second proposed testing mechanism outperforms in terms of test time because this method test all the interconnects in only three phases, independent to the number of existed interconnects in the network, while test time of other methods are highly dependent to the number of switches and interconnects in the NoC.

Keywords: on chip, interconnection testing, horizontal-vertical testing, enhanced unicast

Procedia PDF Downloads 554
11383 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 235
11382 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 166
11381 Automated User Story Driven Approach for Web-Based Functional Testing

Authors: Mahawish Masud, Muhammad Iqbal, M. U. Khan, Farooque Azam

Abstract:

Manual writing of test cases from functional requirements is a time-consuming task. Such test cases are not only difficult to write but are also challenging to maintain. Test cases can be drawn from the functional requirements that are expressed in natural language. However, manual test case generation is inefficient and subject to errors.  In this paper, we have presented a systematic procedure that could automatically derive test cases from user stories. The user stories are specified in a restricted natural language using a well-defined template.  We have also presented a detailed methodology for writing our test ready user stories. Our tool “Test-o-Matic” automatically generates the test cases by processing the restricted user stories. The generated test cases are executed by using open source Selenium IDE.  We evaluate our approach on a case study, which is an open source web based application. Effectiveness of our approach is evaluated by seeding faults in the open source case study using known mutation operators.  Results show that the test case generation from restricted user stories is a viable approach for automated testing of web applications.

Keywords: automated testing, natural language, restricted user story modeling, software engineering, software testing, test case specification, transformation and automation, user story, web application testing

Procedia PDF Downloads 388
11380 Effect of Base Coarse Layer on Load-Settlement Characteristics of Sandy Subgrade Using Plate Load Test

Authors: A. Nazeri, R. Ziaie Moayed, H. Ghiasinejad

Abstract:

The present research has been performed to investigate the effect of base course application on load-settlement characteristics of sandy subgrade using plate load test. The main parameter investigated in this study was the subgrade reaction coefficient. The model tests were conducted in a 1.35 m long, 1 m wide, and 1 m deep steel test box of Imam Khomeini International University (IKIU Calibration Chamber). The base courses used in this research were in three different thicknesses of 15 cm, 20 cm, and 30 cm. The test results indicated that in the case of using base course over loose sandy subgrade, the values of subgrade reaction coefficient can be increased from 7  to 132 , 224 , and 396  in presence of 15 cm, 20 cm, and 30 cm base course, respectively.

Keywords: modulus of subgrade reaction, plate load test, base course, sandy subgrade

Procedia PDF Downloads 249
11379 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women

Authors: Abeer Al Kalbani

Abstract:

Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.

Keywords: food security, household food security, utilization, role of women

Procedia PDF Downloads 407
11378 Impact of an Exercise Program on Physical Fitness of a Candidate to Naval Academy: A Case Study

Authors: Ricardo Chaves, Carlos Vasconcelos

Abstract:

Candidates to join the Naval Academy have to take a set of physical tests, which is crucial for a high level of physical fitness. Thus, the planning of physical exercises for candidates to the Naval School must take into account the improvement of their physical fitness. The aim of this study was to investigate the impact of a 6-month exercise program to improve the physical fitness of an individual who will apply for the Naval Academy. This was a non-experimental pre-post-evaluation study. The patient was male, had 18 years old, and a body mass index of 21.1 kg.m². The patient participated in a 6-month aerobic and strength exercise program (3 sessions per week, 75 minutes duration each session). Physical fitness tests were performed according to the physical fitness requirements for entry into the Naval academy (muscle strength [maximum number of lifts and maximum number of sit-ups for 1 minute]; aerobic fitness [2.4 km run and 200 m swimming test]) before (baseline) and after the exercise intervention (6 months). Regarding muscle strength, in the abdominal test, the improvements between the pre-test (39 abdominals.) and post-test (61 abdominals) were 56.4%. For elevations, there was an increase in its number by 150% between the pre-test (4 elevations) and post-test (10 elevations). With regard to aerobic fitness, in the 2.4 km race, there was an evolution of 32.0% between the pre-test (16.46 min.) and the post-test (12.42 min.). For the 200-meter swimming test, there was a negative variation of 2% between the pre-test (2.25 min.) and post-test (2.28 min). A 6-month aerobic and strength exercise program leads to a positive evolution in the muscular strength of the patient. Regarding aerobic fitness, opposite results were found, with a positive evolution in the 2.4 km running test and a negative evolution in the swimming test. In future exercise programs for the improvement of the physical fitness of candidates for the Naval Academy, more emphasis has to be done on specific swimming training.

Keywords: case study, exercise program, Naval Academy, physical fitness

Procedia PDF Downloads 92
11377 Evaluating the Validity of the Combined Bedside Test in Diagnosing Juvenile Myasthenia Gravis (2012-2024)

Authors: Pechpailin Kortnoi, Tanitnun Paprad

Abstract:

Background: Myasthenia gravis (MG) is an autoimmune disorder characterized by impaired neuromuscular transmission due to antibodies against nicotinic receptors, leading to muscle weakness, ptosis, and respiratory issues. The incidence of MG has risen globally, emphasizing the need for effective diagnostics. Objective: This study evaluates the validity of a combined bedside test (the ice pack test and fatigability test) for diagnosing juvenile myasthenia gravis (JMG) in pediatric patients with ptosis. Methods: This cross-sectional study, conducted from January 2012 to May 2024 at King Chulalongkorn Memorial Hospital, Thailand, included pediatric patients (1 month to 18 years) with ptosis undergoing ice pack and fatigability tests. Data included demographics, clinical findings, and test results. Diagnostic efficacy was assessed using sensitivity, specificity, accuracy, PPV, NPV, Fagan Nomogram, Kappa Statistics, and McNemar’s Chi-Square. Results: Of 43 identified patients, 32 were included, with 47% male and a mean age of 7 years. The combined bedside test had high sensitivity (92.8%) and accuracy (87.5%) but moderate specificity (50%). It significantly outperformed the ice pack test (P = 0.0005), which showed low sensitivity (42.8%) and accuracy (43.8%). The fatigability test had 82% sensitivity and 92% PPV. Confirmatory tests (AChR-Ab, MuSK-Ab, neostigmine, repetitive nerve stimulation) supported most diagnoses. Conclusions: The combined bedside test, with high sensitivity (92.8%) and accuracy (87.5%), is an effective screening tool for juvenile myasthenia gravis, outperforming the ice pack test. Integrating it into clinical practice may improve diagnosis and enable timely treatment. The fatigability test (82% sensitivity) is also useful as an adjunct screening tool.

Keywords: myasthenia gravis, the fatigability test, the ice pack test, the combined bedside test

Procedia PDF Downloads 12
11376 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 97
11375 Mastering Test Automation: Bridging Gaps for Seamless QA

Authors: Rohit Khankhoje

Abstract:

The rapid evolution of software development practices has given rise to an increasing demand for efficient and effective test automation. The paper titled "Mastering Test Automation: Bridging Gaps for Seamless QA" delves into the crucial aspects of test automation, addressing the obstacles faced by organizations in achieving flawless quality assurance. The paper highlights the importance of bridging knowledge gaps within organizations, emphasizing the necessity for management to acquire a deeper comprehension of test automation scenarios, coverage, report trends, and the importance of communication. To tackle these challenges, this paper introduces innovative solutions, including the development of an automation framework that seamlessly integrates with test cases and reporting tools like TestRail and Jira. This integration facilitates the automatic recording of bugs in Jira, enhancing bug reporting and communication between manual QA and automation teams as well as TestRail have all newly added automated testcases as soon as it is part of the automation suite. The paper demonstrates how this framework empowers management by providing clear insights into ongoing automation activities, bug origins, trend analysis, and test case specifics. "Mastering Test Automation" serves as a comprehensive guide for organizations aiming to enhance their quality assurance processes through effective test automation. It not only identifies the common pitfalls and challenges but also offers practical solutions to bridge the gaps, resulting in a more streamlined and efficient QA process.

Keywords: automation framework, API integration, test automation, test management tools

Procedia PDF Downloads 76
11374 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 456
11373 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability

Authors: Özlem Turan, Şule Turhan

Abstract:

About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.

Keywords: food, food safety, food systems, sustainability

Procedia PDF Downloads 386
11372 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 455
11371 Inhibition of Pipelines Corrosion Using Natural Extracts

Authors: Eman Alzahrani, Hala M. Abo-Dief, Ashraf T. Mohamed

Abstract:

The present work is aimed at examining carbon steel oil pipelines corrosion using three natural extracts (Eruca Sativa, Rosell and Mango peels) that are used as inhibitors of different concentrations ranging from 0.05-0.1wt. %. Two sulphur compounds are used as corrosion mediums. Weight loss method was used for measuring the corrosion rate of the carbon steel specimens immersed in technical white oil at 100ºC at various time intervals in absence and presence of the two sulphur compounds. The corroded specimens are examined using the chemical wear test, scratch test and hardness test. The scratch test is carried out using scratch loads from 0.5 Kg to 2.0 Kg. The scratch width is obtained at various scratch load and test conditions. The Brinell hardness test is carried out and investigated for both corroded and inhibited specimens. The results showed that three natural extracts can be used as environmentally friendly corrosion inhibitors.

Keywords: inhibition, natural extract, oil pipelines corrosion, sulphur compounds

Procedia PDF Downloads 509
11370 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 317
11369 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria

Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim

Abstract:

Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.

Keywords: good quality of water, water accessibility, water availability, water sustainable

Procedia PDF Downloads 529
11368 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 325
11367 Comparison of Direct and Indirect Tensile Strength of Brittle Materials and Accurate Estimate of Tensile Strength

Authors: M. Etezadi, A. Fahimifar

Abstract:

In many geotechnical designs in rocks and rock masses, tensile strength of rock and rock mass is needed. The difficulties associated with performing a direct uniaxial tensile test on a rock specimen have led to a number of indirect methods for assessing the tensile strength that in the meantime the Brazilian test is more popular. Brazilian test is widely applied in rock engineering because specimens are easy to prepare, the test is easy to conduct and uniaxial compression test machines are quite common. This study compares experimental results of direct and Brazilian tensile tests carried out on two rock types and three concrete types using 39 cylindrical and 28 disc specimens. The tests are performed using Servo-Control device. The relationship between direct and indirect tensile strength of specimens is extracted using linear regression. In the following, tensile strength of direct and indirect test is evaluated using finite element analysis. The results are analyzed and effective factors on results are studied. According to the experimental results Brazilian test is shown higher tensile strength than direct test. Because of decreasing the contact surface of grains and increasing the uniformity in concrete specimens with fine aggregate (largest grain size= 6mm), higher tensile strength in direct test is shown. The experimental and numerical results of tensile strength are compared and empirical relationship witch is obtained from experimental tests is validated.

Keywords: tensile strength, brittle materials, direct and indirect tensile test, numerical modeling

Procedia PDF Downloads 550
11366 The Development of Portable Application Software for Cardiovascular Fitness Norms of NDUM Cadet Students

Authors: Mohar Kassim, Hardy Azmir, Rahmat Sholihin Mokhtar

Abstract:

The purpose of this study is to build portable application software to determine the level of cardiovascular fitness for cadet students of the National Defence University of Malaysia (NDUM). Fitness in the context of this study refers to physical fitness, specifically the cardiovascular endurance level test battery in the form of a 2.4 km run test for UPNM cadet students. This run test will be conducted to measure, test, and evaluate the performance of UPNM cadet students. All the run test results can be recorded electronically inside the portable software and will later be able to show the level of cardiovascular fitness of every cadet student according to age and gender. This software can also calculate the body mass index (BMI). Normative survey method will be used in this study through the analysis of the 2.4 km run test results. The run test scores will be classified in interval and ratio scales. Based on the findings of this study, portable application software will produced. The software will be able to directly assist the Military Training Academy (ALK), Malaysian Armed Forces (ATM), and other relevant agencies in determining the level of cardiovascular fitness among their staff. The test can be done electronically and on portable mode. The next step to be taken is to have this application patented.

Keywords: development, software, application, portable, fitness norms, cardiovascular endurance

Procedia PDF Downloads 550
11365 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 453
11364 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security

Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika

Abstract:

Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.

Keywords: food security, institutional strengthening, model implementation, women farmer group

Procedia PDF Downloads 182
11363 A Refrigerated Condition for the Storage of Glucose Test Strips at Health Promoting Hospitals: An Implication for Hospitals with Limited Air Conditioners

Authors: Wanutchaya Duanginta, Napaporn Apiratmateekul, Tippawan Sangkaew, Sunaree Wekinhirun, Kunchit Kongros, Wanvisa Treebuphachatsakul

Abstract:

Thailand has a tropical climate with an average outdoor ambient air temperature of over 30°C, which can exceed manufacturer recommendations for the storage of glucose test strips. This study monitored temperature and humidity at actual sites of five sub-district health promoting hospitals (HPH) in Phitsanulok Province for the storage of glucose test strips in refrigerated conditions. Five calibrated data loggers were placed at the actual sites for glucose test strip storage at five HPHs for 8 weeks between April and June. For the stress test, two lot numbers of glucose test strips, each with two glucose meters, were kept in a plastic box with desiccants and placed in a refrigerator with the temperature calibrated to 4°C and at room temperature (RT). Temperature and humidity in the refrigerator and at RT were measured every hour for 30 days. The mean temperature for storing test strips at the five HPHs ranged from 29°C to 33°C, and three of the five HPHs (60%) had a mean temperature above 30°C. The refrigerator temperatures were 3.8 ± 2.0°C (2.0°C to 6.5°C), and relative humidity was 51 ± 2% (42 to 54%). The maximum of blood glucose testing by glucose meters when the test strips were stored in a refrigerator were not significantly different (p > 0.05) from unstressed test strips for both glucose meters using amperometry-GDH-PQQ and amperometry-GDH-FAD principles. Opening the test strip vial daily resulted in higher variation than when refrigerated after a single-use. However, the variations were still within an acceptable range. This study concludes that glucose tested strips can be stored in plastic boxes in a refrigerator if it is well-controlled for temperature and humidity. Storage of glucose-tested strips in the refrigerator during hot and humid weather may be useful for HPHs with limited air conditioners.

Keywords: environmental stressed test, thermal stressed test, quality control, point-of-care testing

Procedia PDF Downloads 195
11362 The Analysis of the Challenge China’s Energy Transition Faces and Proposed Solutions

Authors: Yuhang Wang

Abstract:

As energy is vital to industrial productivity and human existence, ensuring energy security becomes a critical government responsibility. The Chinese government has implemented the energy transition to safeguard China’s energy security. Throughout this progression, the Chinese government has faced numerous obstacles. This article seeks to describe the causes of China’s energy transition barriers and the steps taken by the Chinese government to overcome them.

Keywords: energy transition, energy market, fragmentation, path dependency

Procedia PDF Downloads 103
11361 Clinico-Microbiological Study of S. aureus from Various Clinical Samples with Reference to Methicillin Resistant S. aureus (MRSA)

Authors: T. G. Pathrikar, A. D. Urhekar, M. P. Bansal

Abstract:

To find out S. aureus from patient samples on the basis of coagulase test. We have evaluated slide coagulase (n=46 positive), tube coagulase (n=48 positive) and DNase test (n=44, positive) , We have isolated and identified MRSA from various clinical samples and specimens by disc diffusion method determined the incidence of MRSA 50% in patients. Found out the in vitro antimicrobial susceptibility pattern of MRSA isolates and also the MIC of MRSA of oxacillin by E-Test.

Keywords: cefoxitin disc diffusion MRSA detection, e – test, S. aureus devastating pathogen, tube coagulase confirmation

Procedia PDF Downloads 494
11360 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 160
11359 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies

Authors: Kristina Thorell

Abstract:

Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.

Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices

Procedia PDF Downloads 317
11358 A Case Study of Assessment of Fire Affected Concrete Structure by NDT

Authors: Nikhil Gopalkrishnan, Praveen Bhaskaran, Aditya Bhargava, Gyandeep Bhumarkar

Abstract:

The present paper is an attempt to perform various Non-Destructive Tests on concrete structure as NDT is gaining a wide importance in the branch of civil engineering these days. Various tests that are performed under NDT not only enable us to determine the strength of concrete structure, but also provide us in-hand information regarding the durability, in-situ properties of the concrete structure. Keeping these points in our mind, we have focused our views on performing a case study to show the comparison between the NDT test results performed on a particular concrete structure and another structure at the same site which is subjected to a continuous fire of say 48-72 hours. The mix design and concrete grade of both the structures were same before the one was affected by fire. The variations in the compressive strength, concrete quality and in-situ properties of the two structures have been discussed in this paper. NDT tests namely Ultrasonic Pulse Velocity Test, Rebound Hammer Test, Core-Cutter Test was performed at both the sites. The main objective of this research is to analyze the variations in the strength and quality of the concrete structure which is subjected to a high temperature fire and the one which isn’t exposed to it.

Keywords: core-cutter test, non-destructive test, rebound hammer test, ultrasonic pulse velocity test

Procedia PDF Downloads 350