Search results for: transformation and security challenges
9012 Traditional Industries Innovation and Brand Value Analysis in Taiwan: Case Study of a Certain Plastic Company
Authors: Ju Shan Lin
Abstract:
The challenges for traditional industries in Taiwan the past few years are the changes of overall domestic and foreign industry structure, the entrepreneurs not only need to keep on improving their profession skills but also continuously research and develop new products. It is also necessary for the all traditional industries to keep updating the business strategy, let the enterprises continue to progress, and won't be easily replaced by the other industries. The traditional industry in Taiwan attach great importance to the field of enterprises upgrading and innovation in recent years, by the enterprise innovation and transformation can enhance the overall business situation also enable them to obtain more additional profits than in the past. Except the original industry structure's need to transform and upgrade, the brand's business and marketing strategy are also essential. This study will take a certain plastic company as case analysis, for the brand promotion of traditional industries, brand values and business innovation model for further exploration. It will also be mentioned that the other traditional industries cases which were already achieved success on the enterprise's upgrading and innovation, at the same time, the difficulties which they faced with and the way they overcome will be explored as well. This study will use the case study method combined with expert interviews to discuss and analyze this certain plastic company's current business situation, the existing products and the possible trends in the future. Looking forward to providing an innovative business model that will enable this plastic company to upgrade its corporate image and the brand could transform successfully.Keywords: brand marketing strategy, enterprise upgrade, industrial transformation, traditional industry
Procedia PDF Downloads 2399011 Academic Freedom Policy: A Case Study
Authors: Marlin Killen
Abstract:
The American Association of University Professors (AAUP) describes academic freedom as essential to the purposes of research and teaching. The importance of academic freedom as a bedrock foundation that supports the work of the professoriate cannot be overstated, and there have been innumerable challenges that have attempted to curtail it. These challenges come from a variety of sources that span legal, ethical, cultural, institutional, and professional perspective and are amplified by social media, traditional media, and political action efforts. Because of these challenges, the development of a comprehensive institutional policy on academic freedom that addresses the principles, practices, and appropriate responses to modern challenges can be a daunting task. This presentation will focus on a case study of a university’s effort to develop an updated, evolving policy on academic freedom that provides a framework and remedies for contemporary challenges to this critical function in higher education.Keywords: academic freedom, academic freedom policy, higher education policy
Procedia PDF Downloads 1999010 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security
Authors: Yael Deutsch, Arieh Gavious
Abstract:
The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.Keywords: game theory, profiling, security, nash equilibrium
Procedia PDF Downloads 1099009 Impact of the Fourth Industrial Revolution on Food Security in South Africa
Authors: Fiyinfoluwa Giwa, Nicholas Ngepah
Abstract:
This paper investigates the relationship between the Fourth Industrial Revolution and food security in South Africa. The Ordinary Least Square was adopted from 2012 Q1 to 2021 Q4. The study used artificial intelligence investment and the food production index as the measure for the fourth industrial revolution and food security, respectively. Findings reveal a significant and positive coefficient of 0.2887, signifying a robust statistical relationship between AI adoption and the food production index. As a policy recommendation, this paper recommends the introduction of incentives for farmers and agricultural enterprises to adopt AI technologies -and the expansion of digital connectivity and access to technology in rural areas.Keywords: Fourth Industrial Revolution, food security, artificial intelligence investment, food production index, ordinary least square
Procedia PDF Downloads 759008 Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
Abstract:
This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.Keywords: cyber security awareness, cyber security education, cyber security, school students
Procedia PDF Downloads 3029007 In Search of a Safe Haven-Sexual Violence Leading to a Change of Sexual Orientation
Authors: Medagedara Kaushalya Sewwandi Supun Gunarathne
Abstract:
This research explores the underlying motivations and consequences of individuals changing their sexual orientation as a response to sexual violence. The primary objective of the study is to unravel the psychological, emotional, and social factors that drive individuals, akin to Celie in Alice Walker’s ‘The Color Purple’, to contemplate and undergo changes in their sexual orientation following the trauma of sexual violence. Through an analytical and qualitative approach, the study employs in-depth textual and thematic analyses to scrutinize the complex interplay between sexual orientation and violence within the selected text. Through a close examination of Celie’s journey and experiences, the study reveals that her decision to switch sexual orientation arises from a desire for a more favorable and benevolent relationship driven by the absence of safety and refuge in her previous relationships. By establishing this bond between sexual orientation and violence, the research underscores how sexual violence can lead individuals to opt for a change in their sexual orientation. The findings highlight Celie’s transformation as a means to seek solace and security, thus concluding that sexual violence can prompt individuals to alter their sexual orientation. The ensuing discussion explores the implications of these findings, encompassing psychological, emotional, and social consequences, as well as the societal and cultural factors influencing the perception of sexual orientation. Additionally, it sheds light on the challenges and stigma faced by those who undergo such transformations. By comprehending the complex relationship between sexual violence and the decision to change sexual orientation, as exemplified by Celie in ‘The Color Purple’, a deeper understanding of the experiences of survivors who seek a safe haven through altering their sexual orientation can be attained.Keywords: sexual violence, sexual orientation, refuge, transition
Procedia PDF Downloads 799006 Paradox of Growing Adaptive Capacities for Sustainability Transformation in Urban Water Management in Bangladesh
Authors: T. Yasmin, M. A. Farrelly, B. C. Rogers
Abstract:
Urban water governance in developing countries faces numerous challenges arising from uncontrolled urban population expansion, water pollution, greater economic push and more recently, climate change impact while undergoing transitioning towards a sustainable system. Sustainability transition requires developing adaptive capacities of the socio-ecological and socio-technical system to be able to deal with complexity. Adaptive capacities deliver strategies to connect individuals, organizations, agencies and institutions at multiple levels for dealing with such complexity. Understanding the level of adaptive capacities for sustainability transformation thus has gained significant research attention within developed countries, much less so in developing countries. Filling this gap, this article develops a conceptual framework for analysing the level of adaptive capacities (if any) within a developing context. This framework then applied to the chronological development of urban water governance strategies in Bangladesh for almost two centuries. The chronological analysis of governance interventions has revealed that crisis (public health, food and natural hazards) became the opportunities and thus opened the windows for experimentation and learning to occur as a deviation from traditional practices. Self-organization and networks thus created the platform for development or disruptions to occur for creating change. Leadership (internal or external) is important for nurturing and upscaling theses development or disruptions towards guiding policy vision and targets as well as championing ground implementation. In the case of Bangladesh, the leadership from the international and national aid organizations and targets have always lead the development whereas more often social capital tools (trust, power relations, cultural norms) act as disruptions. Historically, this has been evident in the development pathways of urban water governance in Bangladesh. Overall this research has shown some level of adaptive capacities is growing for sustainable urban growth in big cities, nevertheless unclear regarding the growth in medium and small cities context.Keywords: adaptive capacity, Bangladesh, sustainability transformation, water governance
Procedia PDF Downloads 3939005 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 859004 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals
Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini
Abstract:
Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.Keywords: food safety, food security, food sovereignty, halal SDG's
Procedia PDF Downloads 3839003 Transformation of Potato, Plantain, Banana to Flour in Order to Enhance Sustainable Development and Promote Local Consumption
Authors: Munu Fritz-Austin Ndam
Abstract:
Although the Cameroonian system of farming is considered as the first generation, the primary actors here involved have not yet understood the meaning of adding value to the product or produce they produce. The challenge here is for everyone who practices agriculture as an income generating activity in Cameroon to be able to understand the concept of value-added products and to know how to go about it. Recent studies have shown that these farmers who depend on agriculture as their main income generation activity make a great loss out of it because they don’t have the means to either transport their produce to the appropriate market, they don’t the knowledge on how to transform it, or they don’t have a means of conserving the product for a longer duration. It is important to note that after a thorough evaluation of the activity carried out, the final added value product sold is of great benefit not only to the producer but the buyer and the population at large. In my proposed prestation, I will discuss how the transformation activity will have a positive impact on the lives of farmers and the buyers and, most importantly, describe the methodology and procedure which is followed before the tubers (banana, Plantain, potato)is transformed into the finished or semi-finished product.Keywords: transformation, sustainability, development, consumption
Procedia PDF Downloads 1039002 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework
Authors: Husnil Khatimah, Fairol Halim
Abstract:
This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper
Procedia PDF Downloads 4549001 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 3779000 Teaching Physics: History, Models, and Transformation of Physics Education Research
Authors: N. Didiş Körhasan, D. Kaltakçı Gürel
Abstract:
Many students have difficulty in learning physics from elementary to university level. In addition, students' expectancy, attitude, and motivation may be influenced negatively with their experience (failure) and prejudice about physics learning. For this reason, physics educators, who are also physics teachers, search for the best ways to make students' learning of physics easier by considering cognitive, affective, and psychomotor issues in learning. This research critically discusses the history of physics education, fundamental pedagogical approaches, and models to teach physics, and transformation of physics education with recent research.Keywords: pedagogy, physics, physics education, science education
Procedia PDF Downloads 2648999 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector
Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid
Abstract:
For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.Keywords: electricity, energy policy, energy security, Malaysia
Procedia PDF Downloads 3058998 Knowledge Transformation Flow (KTF) of Visually Impaired Students: The Virtual Knowledge System as a New Service Innovation
Authors: Chatcai Tangsri, Onjaree Na-Takuatoong
Abstract:
This paper aims to present the key factors that support the decision to use the technology and to present the knowledge transformation flow of visually impaired students after the use of virtual knowledge system as proposed as a new service innovation to universities in Thailand. Correspondents of 27 visually impaired students are involved in this research. Total of 25 students are selected from the University that mainly conducts non-classroom teaching environment; while another 2 visually impaired students are selected from classroom teaching environment. All of them are fully involved in the study along 8 weeks duration. All correspondents are classified into 5 small groups in various conditions. The research results revealed that the involvement from knowledge facilitator can push out for the behavioral actual use of the virtual knowledge system although there is no any developed intention to use behaviors. Secondly, the situations that the visually impaired students inadequate of the knowledge sources that usually provided by assistants i.e. peers, audio files etc. In this case, they will use the virtual knowledge system for both knowledge access and knowledge transfer request. With this evidence, the need of knowledge would play a stronger role than all technology acceptance factors. Finally, this paper revealed that the knowledge transfer in the normal method that students have a chance to physically meet up is still confirmed as their preference method. In term of other aspects of technology acceptance, it will be discussed together with challenges and recommendations at the end of this paper.Keywords: knowledge system, visually impaired students, higher education, knowledge management enable technology, synchronous/asynchronous knowledge access, synchronous/asynchronous knowledge transfer
Procedia PDF Downloads 3558997 Global Optimization: The Alienor Method Mixed with Piyavskii-Shubert Technique
Authors: Guettal Djaouida, Ziadi Abdelkader
Abstract:
In this paper, we study a coupling of the Alienor method with the algorithm of Piyavskii-Shubert. The classical multidimensional global optimization methods involves great difficulties for their implementation to high dimensions. The Alienor method allows to transform a multivariable function into a function of a single variable for which it is possible to use efficient and rapid method for calculating the the global optimum. This simplification is based on the using of a reducing transformation called Alienor.Keywords: global optimization, reducing transformation, α-dense curves, Alienor method, Piyavskii-Shubert algorithm
Procedia PDF Downloads 5038996 Qualitative Case Study Research in Accounting: Challenges and Prospects the Libyan Case Study
Authors: Bubaker F. Shareia
Abstract:
Much of the literature on research design has focussed on research conducted in developed, uni-cultural or primarily English speaking countries. Studies of qualitative case study research, the challenges and prospects have been embedded in Western/Euro-centric society and social theories. Although there have been some theoretical studies, few empirical studies have been conducted to explore the nature of the challenges of qualitative case study in developing countries. These challenges include accessibility to organizations, conducting interviews in developing countries, accessing documents and observing official meetings, language and cultural challenges, the use of consent forms, issues affecting access to companies, respondent issues and data analysis. The author, while conducting qualitative case study research in Libya, faced all these issues. The discussion in this paper examines these issues in order to make a contribution toward the literature in this area.Keywords: accounting, challenges, prospects, developing countries, Libya, qualitative case study
Procedia PDF Downloads 3088995 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3238994 21st Century Islam: Global Challenges of Islamic Representation and Knowledge Acquisition
Authors: M. M. Muhammed, O. Khuzaima
Abstract:
This research examined and outlined some of the challenges facing Islam and Muslims in the 21st century, considering global Islamic representation and knowledge acquisition as key objectives. It was observed that the Western media misrepresentation of Islam and the Western ethos embodied by the acquisition of western civilisation are major challenges faced by Islam and Muslims today. The problem of sectarianism, decline in the socio-economic power of Muslim communities and the archaic nature of the Islamic creed were recorded as major actors to the evolving global Islamic issues. It was therefore concluded that Islam is not the reason for these challenges, rather the action of some Muslims and non-Muslims were the contributing factors to the pandemics faced by Islam and Muslims. Some relevant recommendations were made to the Islamic world that could serve as effectual solutions to these lingering problems.Keywords: Islam, challenges, representation, knowledge, century, global, twenty-first
Procedia PDF Downloads 2338993 Mature Cystic Teratomas of Ovary: A Series of 19 Cases with Rare Malignant Transformation in Three
Authors: Parveen Kundu, Nitika Chawla, Ruchi Agarwal, Swaran Kaur
Abstract:
Background: Mature cystic teratoma is a benign, most common tumor of the ovary occurring mostly in young and middle-aged females. This study consists of 19 cases of mature cystic teratomas which were received in the Department Of Pathology over a period of two years. There were malignant transformations observed in three cases, which makes it very important for pathologists to thoroughly examine the entire specimen of mature cystic teratomas. Material and Methods: Nineteen reported cases of mature cystic teratomas were received in Deptt. Of Pathology, BPS GMC Khanpur Kalan, Sonepat, over a two-year period from November 2020 to October 2022 and reviewed retrospectively. Data regarding age, size, laterality, gross, morphological features, and surgery performed were retrieved from pathological archives. Results: In our study, the most common age of presentation was the 20-40 year age group. The most common presenting complaint was fullness in the abdomen or abdominal distension. Four out of 19 cases studied cases presented with bilateral ovarian cysts. Tumor size ranged from 6 to 20 cm in diameter. In seven cases, cysts were greater than or equal to 10 cm in diameter. Three cases showed malignant transformation. Conclusion: It is very important to thoroughly examine the contralateral ovary to rule out bilateral presentation. A furthermost thorough examination is advised in tumors of size >10 cm and in tumors with solid areas to rule out any malignant transformation.Keywords: teratoma, ovary, malignant, transformation
Procedia PDF Downloads 878992 The Design Method of Artificial Intelligence Learning Picture: A Case Study of DCAI's New Teaching
Authors: Weichen Chang
Abstract:
To create a guided teaching method for AI generative drawing design, this paper develops a set of teaching models for AI generative drawing (DCAI), which combines learning modes such as problem-solving, thematic inquiry, phenomenon-based, task-oriented, and DFC . Through the information security AI picture book learning guided programs and content, the application of participatory action research (PAR) and interview methods to explore the dual knowledge of Context and ChatGPT (DCAI) for AI to guide the development of students' AI learning skills. In the interviews, the students highlighted five main learning outcomes (self-study, critical thinking, knowledge generation, cognitive development, and presentation of work) as well as the challenges of implementing the model. Through the use of DCAI, students will enhance their consensus awareness of generative mapping analysis and group cooperation, and they will have knowledge that can enhance AI capabilities in DCAI inquiry and future life. From this paper, it is found that the conclusions are (1) The good use of DCAI can assist students in exploring the value of their knowledge through the power of stories and finding the meaning of knowledge communication; (2) Analyze the transformation power of the integrity and coherence of the story through the context so as to achieve the tension of ‘starting and ending’; (3) Use ChatGPT to extract inspiration, arrange story compositions, and make prompts that can communicate with people and convey emotions. Therefore, new knowledge construction methods will be one of the effective methods for AI learning in the face of artificial intelligence, providing new thinking and new expressions for interdisciplinary design and design education practice.Keywords: artificial intelligence, task-oriented, contextualization, design education
Procedia PDF Downloads 308991 Protein Remote Homology Detection by Using Profile-Based Matrix Transformation Approaches
Authors: Bin Liu
Abstract:
As one of the most important tasks in protein sequence analysis, protein remote homology detection has been studied for decades. Currently, the profile-based methods show state-of-the-art performance. Position-Specific Frequency Matrix (PSFM) is widely used profile. However, there exists noise information in the profiles introduced by the amino acids with low frequencies. In this study, we propose a method to remove the noise information in the PSFM by removing the amino acids with low frequencies called Top frequency profile (TFP). Three new matrix transformation methods, including Autocross covariance (ACC) transformation, Tri-gram, and K-separated bigram (KSB), are performed on these profiles to convert them into fixed length feature vectors. Combined with Support Vector Machines (SVMs), the predictors are constructed. Evaluated on two benchmark datasets, and experimental results show that these proposed methods outperform other state-of-the-art predictors.Keywords: protein remote homology detection, protein fold recognition, top frequency profile, support vector machines
Procedia PDF Downloads 1258990 A Survey of Key Challenges of Adopting Agile in Global Software Development: A Case Study with Malaysia Perspective
Authors: Amna Batool
Abstract:
Agile methodology is the current most popular technique in software development projects. Agile methods in software development bring optimistic impact on software performances, quality and customer satisfaction. There are some organizations and small-medium enterprises adopting agile into their local software development projects as well as in distributed software development projects. Adopting agile methods in local software development projects is valuable. However, agile global software deployment needs an attention. There are different key challenges in agile global software development that need to resolve and enhance the global software development cycles. The proposed systematic literature review investigates all key challenges of agile in global software development. Moreover, a quantitative methodology (an actual survey) targeted to present a real case scenario of these particular key challenges faced by one of the software houses that is BestWeb Malaysia. The outcomes of systematic literature and the results of quantitative methodology are compared with each other to evaluate if the key challenges pointed out in systematic review still exist. The proposed research and its exploratory results can assist small medium enterprises to avoid these challenges by adopting the best practices in their global software development projects. Moreover, it is helpful for novice researchers to get valuable information altogether.Keywords: agile software development, ASD challenges, agile global software development, challenges in agile global software development
Procedia PDF Downloads 1578989 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur
Authors: Sandra Thomas
Abstract:
This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.Keywords: food security, dietary diversity, household level, socio-economic classes
Procedia PDF Downloads 1258988 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles
Authors: Vikram Prabhu, Mohammad Shikh Bahaei
Abstract:
This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark
Procedia PDF Downloads 3018987 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract
Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala
Abstract:
Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.Keywords: blockchain, data, data marketplace, smart contract, reputation system
Procedia PDF Downloads 1588986 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats
Authors: Ivan Župan
Abstract:
Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology
Procedia PDF Downloads 778985 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria
Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.
Abstract:
This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.Keywords: farming household, food security, identification and aggregation, food security index
Procedia PDF Downloads 2918984 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod
Abstract:
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.Keywords: XML database, trust-based access control, severity-aware, trust values, log file
Procedia PDF Downloads 3008983 SOTM: A New Cooperation Based Trust Management System for VANET
Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel
Abstract:
Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.Keywords: ative vehicle, cooperation, trust management, VANET
Procedia PDF Downloads 430