Search results for: human factor in security
14619 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe
Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran
Abstract:
The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.Keywords: access control, multimodal biometrics, pattern recognition, security safe
Procedia PDF Downloads 33514618 Basics of SCADA Security: A Technical Approach
Authors: Michał Witas
Abstract:
This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.Keywords: denial of service, SCADA, security policy, distributed network
Procedia PDF Downloads 37314617 Time Series Modelling for Forecasting Wheat Production and Consumption of South Africa in Time of War
Authors: Yiseyon Hosu, Joseph Akande
Abstract:
Wheat is one of the most important staple food grains of human for centuries and is largely consumed in South Africa. It has a special place in the South African economy because of its significance in food security, trade, and industry. This paper modelled and forecast the production and consumption of wheat in South Africa in the time covid-19 and the ongoing Russia-Ukraine war by using annual time series data from 1940–2021 based on the ARIMA models. Both the averaging forecast and selected models forecast indicate that there is the possibility of an increase with respect to production. The minimum and maximum growth in production is projected to be between 3million and 10 million tons, respectively. However, the model also forecast a possibility of depression with respect to consumption in South Africa. Although Covid-19 and the war between Ukraine and Russia, two major producers and exporters of global wheat, are having an effect on the volatility of the prices currently, the wheat production in South African is expected to increase and meat the consumption demand and provided an opportunity for increase export with respect to domestic consumption. The forecasting of production and consumption behaviours of major crops play an important role towards food and nutrition security, these findings can assist policymakers and will provide them with insights into the production and pricing policy of wheat in South Africa.Keywords: ARIMA, food security, price volatility, staple food, South Africa
Procedia PDF Downloads 10214616 Impact of Organic Farming on Soil Fertility and Microbial Activity
Authors: Menuka Maharjan
Abstract:
In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.Keywords: organic farming, soil fertility, micobial biomas, food security
Procedia PDF Downloads 17614615 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms
Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos
Abstract:
The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution
Procedia PDF Downloads 34614614 Digital Image Steganography with Multilayer Security
Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal
Abstract:
In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix
Procedia PDF Downloads 33714613 Human Rights in the United States: Challenges and Lessons from the Period 1948-2018
Authors: Mary Carmen Peloche Barrera
Abstract:
Since its early years as an independent nation, the United States has been one of the main promoters regarding the recognition, legislation, and protection of human rights. In the matter of freedom, the founding father Thomas Jefferson envisioned the role of the U.S. as a defender of freedom and equality throughout the world. This founding ideal shaped America’s domestic and foreign policy in the 19th and the 20th century and became an aspiration of the ideals of the country to expand its values and institutions. The history of the emergence of human rights cannot be studied without making reference to leaders such as Woodrow Wilson, Franklin, and Eleanor Roosevelt, as well as Martin Luther King. Throughout its history, this country has proclaimed that the protection of the freedoms of men, both inside and outside its borders, is practically the reason for its existence. Although the United States was one of the first countries to recognize the existence of inalienable rights for individuals, as well as the main promoter of the Universal Declaration of Human Rights of 1948, the country has gone through critical moments that had led to questioning its commitment to the issue. Racial segregation, international military interventions, national security strategy, as well as national legislation on immigration, are some of the most controversial issues related to decisions and actions driven by the United States, which at the same time mismatched with its role as an advocate of human rights, both in the Americas and in the rest of the world. The aim of this paper is to study the swinging of the efforts and commitments of the United States towards human rights. The paper will analyze the history and evolution of human rights in the United States, to study the greatest challenges for the country in this matter. The paper will focus on both the domestic policy (related to demographic issues) and foreign policy (about its role in a post-war world). Currently, more countries are joining the multilateral efforts for the promotion and protection of human rights. At the same time, the United States is one of the least committed countries in this respect, having ratified only 5 of the 18 treaties emanating from the United Nations. The last ratification was carried out in 2002 and, since then, the country has been losing ground, in an increasingly vertiginous way, in its credibility and, even worse, in its role as leader of 'the free world'. With or without the United States, the protection of human rights should remain the main goal of the international community.Keywords: United States, human rights, foreign policy, domestic policy
Procedia PDF Downloads 11814612 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields
Authors: Okoro Ikechukwu Ralph, Fuat Kara
Abstract:
The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.Keywords: offshore reliability, production performance, subsea control module, well integrity
Procedia PDF Downloads 51214611 Potential Ecological Risk Index of the Northern Egyptian Lagoons, South of Mediterranean Sea, Egypt
Authors: Mohamed El-Bady
Abstract:
The Northern Egyptian Lagoons are (from east to west) Bardawil Lagoon, Manzala Lagoon, Burullus Lagoon, Edku Lagoons and Mariute Lagoon. These lagoons have been received the bulk of drainage water from the lands of Delta and from the other coastal areas. Where, the heavy metals can occur in Lagoons environments through a variety of sources, including industries, wastewaters and domestic effluents. The potential ecological risk index (RI) calculation of the bottom sediments of the northern lagoons depends on contamination factor (CF), potential ecological risk factor and proposed toxic response factor (Tr). Each lagoon with special indices according to its conditions.Keywords: Northern Lagoons, Nile Delta, ecological risk index, contamination factor
Procedia PDF Downloads 34214610 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography
Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo
Abstract:
Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding
Procedia PDF Downloads 20414609 Human Rights Regulations and Rules Affecting Community
Authors: Mariana Sary Khalifa Rezk
Abstract:
The problem of respect for human rights in Southeast Asia has emerged as a main situation and is attracting the attention of the international network. Basically, the affiliation of Southeast Asian Nations (ASEAN) made human rights certainly one of its main troubles inside the ASEAN constitution in 2008. In the end, the Intergovernmental Fee on Human Rights ASEAN Human Rights (AICHR) was set up. AICHR is the Southeast Asia Human Rights Enforcement fee charged with the duties, functions and powers to sell and defend human rights. However, at the cease of 2016, the protecting feature assigned to the AICHR was no longer fulfilled. That is shown via several instances of human rights violations, which can be nonetheless ongoing and have not been solved. One case that has these days come to light is human rights violations against the Rohingya people in Myanmar. Using a felony-normative method, the study examines the urgency of setting up a human rights tribunal in Southeast Asia able to decide binding on ASEAN members or responsible parties. Information indicates ASEAN desires regional courts to cope with human rights abuses in the ASEAN region. Furthermore, the look also highlights 3 critical elements that ASEAN ought to take into account whilst establishing a human rights tribunal, particularly quantity. A good sized distinction in phrases of democracy and human rights improvement a few of the participants, a consistent implementation of the principle of non-interference and the economic trouble of the continuation of the court docket.Keywords: politics, human rights, humanities, mankind, law human rights, Nigerian legal provisions, shariah law, comparative study, charter
Procedia PDF Downloads 2914608 A Study on Method for Identifying Capacity Factor Declination of Wind Turbines
Authors: Dongheon Shin, Kyungnam Ko, Jongchul Huh
Abstract:
The investigation on wind turbine degradation was carried out using the nacelle wind data. The three Vestas V80-2MW wind turbines of Sungsan wind farm in Jeju Island, South Korea were selected for this work. The SCADA data of the wind farm for five years were analyzed to draw power curve of the turbines. It is assumed that the wind distribution is the Rayleigh distribution to calculate the normalized capacity factor based on the drawn power curve of the three wind turbines for each year. The result showed that the reduction of power output from the three wind turbines occurred every year and the normalized capacity factor decreased to 0.12%/year on average.Keywords: wind energy, power curve, capacity factor, annual energy production
Procedia PDF Downloads 43314607 Digital Twin for Retail Store Security
Authors: Rishi Agarwal
Abstract:
Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety
Procedia PDF Downloads 7214606 Exploring the Application of Human Resource Management Bundles: A Case Study
Authors: Maniam Kaliannan
Abstract:
Studies on best practice or “bundles” of human resource management aims at providing a ‘universal solution’ to organizations yet critics challenge this view and place importance on the architecture of human resource processes in response to the dynamic needs of organizations. This paper identifies these best practices and explores how the applications of selected human resource management practices to a case study help solved their human resource problems. The case study includes insights on the problems faced; the approach taken to identify its root causes and explores how selected human resource management practices helped managed the overall predicament. The case study results supports the importance of aligning ‘bundles’ of practices with organizational architecture and ensuring that the architecture of human resource practices evolve with the changing needs of organizations. In addition, a framework based on the events of the case study is proposed to systematically manage their human resourcesKeywords: bundles, best practices, human resource management, organizational architecture, framework
Procedia PDF Downloads 42714605 Prevention and Treatment of Hay Fever Prevalence by Natural Products: A Phytochemistry Study on India and Iran
Authors: Tina Naser Torabi
Abstract:
Prevalence of allergy is affected by different factors according to its base and seasonal weather changes, and it also needs various treatments.Although reasons of allergy existence are not clear but generally, allergens cause reaction between antigen and antibody because of their antigenic traits. In this state, allergens cause immune system to make mistake and identify safe material as threat, therefore function of immune system impaired because of histamine secretion. There are different reasons for allergy, but herbal reasons are on top of the list, although animal causes cannot be ignored. Important point is that allergenic compounds, cause making dedicated antibody, so in general every kind of allergy is different from the other one. Therefore, most of the plants in herbal allergenic category can cause various allergies for human beings, such as respiratory allergies, nutritional allergies, injection allergies, infection allergies, touch allergies, that each of them show different symptoms based on the reason of allergy and also each of them requires different prevention and treatment. Geographical condition is another effective factor in allergy. Seasonal changes, weather condition, herbal coverage variety play important roles in different allergies. It goes without saying that humid climate and herbal coverage variety in different seasons especially spring cause most allergies in human beings in Iran and India that are discussed in this article. These two countries are good choices for allergy prevalence because of their condition, various herbal coverage, human and animal factors. Hay fever is one of the allergies, although the reasons of its prevalence are unknown yet. It is one of the most popular allergies in Iran and India because of geographical, human, animal and herbal factors. Hay fever is on top of the list in these two countries. Significant point about these two countries is that herbal factor is the most important factor in prevalence of hay fever. Variety of herbal coverage especially in spring during herbal pollination is the main reason of hay fever prevalence in these two countries. Based on the research result of Pharmacognosy and Phytochemistry, pollination of some plants in spring is major reason of hay fever prevalence in these countries. If airborne pollens in pollination season enter the human body through air, they will cause allergic reactions in eyes, nasal mucosa, lungs, and respiratory system, and if these particles enter the body of potential person through food, they will cause allergic reactions in mouth, stomach, and other digestive systems. Occasionally, chemical materials produced by human body such as Histamine cause problems like: developing of nasal polyps, nasal blockage, sleep disturbance, risk of asthma developing, blood vasodilation, sneezing, eye tears, itching and swelling of eyes and nasal mucosa, Urticaria, decrease in blood pressure, and rarely trauma, anesthesia, anaphylaxis and finally death. This article is going to study the reasons of hay fever prevalence in Iran and India and presents prevention and treatment Method from Phytochemistry and Pharmocognocy point of view by using local natural products in these two countries.Keywords: hay fever, India, Iran, natural treatment, phytochemistry
Procedia PDF Downloads 16414604 Study of Influencing Factors of Shrinking Cities Based on Factor Analysis: The Example of Halle Germany
Authors: Fang Yao, Minglei Chen
Abstract:
City shrinkage is one of the thorny problems that many European cities have to face with nowadays. It is mainly expressed as the decrease of population in these cities. Eastern Germany is one of the pioneers of European shrinking cities with long shrinking history. Selecting one representative shrinking city Halle(Saale) in eastern Germany as research objective, collecting and investigating nearly 20 years (1993-2010) municipal data after the reunification of Germany. These data based on five dimensions, which are demographic, economic, social, spatial and environmental and total 16 eligible variables. Using Factor Analysis to dealing with these variables in order to assess the most important factors affecting shrinking Halle. The Factor Analysis shows that there are three main factors determine the shrinkage of Halle, namely demographical and economical factor, social stability factor, and city vitality factor. Three factors acts at different period of Halle’s shrinkage: from 1993 to 1997 the demographical and economical factor played an important role; from 1997 to 2004 the social stability is significant to city shrinkage; since 2005 city vitality factors determines the shrinkage of Halle. In recent years, the shrinkage in Halle mitigates that shows the sign of growing population. Thus the city Halle should focus on attaching more importance on the city vitality factor to prevent the city from shrinkage. Meanwhile, the city should possess a positive perspective that to shift the growth-oriented development to tap the potential of shrinking cities. This method is expected to apply to further research and other shrinking cities.Keywords: demography, factor analysis, Halle, shrinking cities
Procedia PDF Downloads 41414603 Innovative Technology to Sustain Food Security in Qatar
Authors: Sana Abusin
Abstract:
Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.Keywords: food security, innovative technology, sustainability, food waste, Qatar
Procedia PDF Downloads 12214602 Reliability Analysis of Partial Safety Factor Design Method for Slopes in Granular Soils
Authors: K. E. Daryani, H. Mohamad
Abstract:
Uncertainties in the geo-structure analysis and design have a significant impact on the safety of slopes. Traditionally, uncertainties in the geotechnical design are addressed by incorporating a conservative factor of safety in the analytical model. In this paper, a risk-based approach is adopted to assess the influence of the geotechnical variable uncertainties on the stability of infinite slopes in cohesionless soils using the “partial factor of safety on shear strength” approach as stated in Eurocode 7. Analyses conducted using Monte Carlo simulation show that the same partial factor can have very different levels of risk depending on the degree of uncertainty of the mean values of the soil friction angle and void ratio.Keywords: Safety, Probability of Failure, Reliability, Infinite Slopes, Sand.
Procedia PDF Downloads 57414601 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 11614600 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 47714599 Sustaining the Mitochondrial Transcription Factor A in Sperm
Authors: Betty Anson
Abstract:
Researchers have found that mature sperm cells are not only devoid of mature MTDNA (mitochondrial DNA) but also lack a particular protein essential for DNA maintenance, known as mitochondrial transcription factor A, or TFAM (transcription factor A mitochondria). As a result, children get the DNA of certain important body functions only from their mothers. More experiments show that TFAM appears to burn out when it is used as a source of energy for sperm movement. This study investigates alternative sources of energy for sperm movement that could sustain the existence of TFAM.Keywords: mItochondria, DNA, TFAM, sperm
Procedia PDF Downloads 7514598 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s
Authors: Zunjarrao Kadam, Vikas Minchekar
Abstract:
The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.Keywords: experimentally induced stress, facial recognition, cognition, security personnel
Procedia PDF Downloads 26114597 Recognition of Sanitation as a Human Right: An Overview of Unresolutions and Reports That Recognizes the Human Right to Sanitation in South-Asian Countries
Authors: Anju Vaidya
Abstract:
Sanitation is concerned with proper disposal of human excreta, waste water and promotion of hygiene. Lack of sanitation impacts our environment affecting our finance, schooling, health, and thus exacerbating poverty, discrimination and exclusion of the marginalized group. Sanitation can be a route and one of the most important factor to reach the goals of all Millennium Development goals. This study aims at exploring what are the rights to sanitation of the people, how it is enacted and what challenges are being faced while implementing the right to sanitation in South-Asian countries (India, Nepal, Pakistan, Bangladesh, Srilanka) at government, non-government and international level. This study also aims at finding how right sanitation is interlinked with children rights. The available reports submitted by government and civil society organizations working in South-Asian countries from the website of the Office of High Commissioner for Human Rights that were submitted under International covenant on economic, social and cultural rights and Convention on rights of the child have been selected and analyzed. The study uses Literature review to analyze these UN documents submitted from 2000 to 2015 in the context of South-Asian countries. Preliminary insight reveals that sanitation is recognized as one of the important factor to attain adequate standard of living. It has been found that inadequate sanitation has been a major factor that affects all aspects of life and one of its devastating impacts is increased child mortality. Many efforts have been made at national and international level in South-Asian countries to improve the state of sanitation and sanitation services. Various approaches such as Community led Total Sanitation, School led Total Sanitation, establishing Open Defecation free zone, water supply services and other sanitation and hygiene awareness programs are being launched. Despite different efforts and programs being implemented, sanitation and hygiene practices and behavior change remains to be a big challenge. Disparity in access and imbalance between urban and rural services and geographical regions, inadequate financing, clear policy framework and fragile functionality are some of the significant challenges faced while implementing these programs. Children are one of the most vulnerable group that are affected to a large extent. The study brings into light varied approaches that are being made and challenges that are being faced by government, non-government and civil society organizations while implementing the programs and strategies related to sanitation. It also highlights the relation of sanitation as a human right with child rights. This can help the stakeholders and policymakers better understand that improving sanitation situation is a process that requires learning, planning and behavior change and achieving sanitation coverage targets and motivating behavior change requires additional tools based on participation, non-discrimination and process approaches for planning and feedback.Keywords: challenges, child rights, open defecation, sanitation as a human right
Procedia PDF Downloads 28114596 Analyzing the Effect of Ambient Temperature and Loads Power Factor on Electric Generator Power Rating
Authors: Ahmed Elsebaay, Maged A. Abu Adma, Mahmoud Ramadan
Abstract:
This study presents a technique clarifying the effect of ambient air temperature and loads power factor changing from standard values on electric generator power rating. The study introduces an optimized technique for selecting the correct electric generator power rating for certain application and operating site ambient temperature. The de-rating factors due to the previous effects will be calculated to be applied on a generator to select its power rating accurately to avoid unsafe operation and save its lifetime. The information in this paper provides a simple, accurate, and general method for synchronous generator selection and eliminates common errors.Keywords: ambient temperature, de-rating factor, electric generator, power factor
Procedia PDF Downloads 35814595 Human Resource Development Strategy in Automotive Industry (Eco-Car) for ASEAN Hub
Authors: Phichak Phutrakhul
Abstract:
The purposes of this research were to study concepts and strategies of human resource development in the automotive manufacturers and to articulate the proposals against the government about the human resource development for automotive industry. In the present study, qualitative study was an in-depth interview in which the qualitative data were collected from the executive or the executive of human resource division from five automotive companies - Toyota Motor (Thailand) Co., Ltd., Nissan Motor (Thailand) Co., Ltd., Mitsubishi Motors (Thailand) Co., Ltd., Honda Automobile (Thailand) Co., Ltd., and Suzuki Motor (Thailand) Co., Ltd. Qualitative data analysis was performed by using inter-coder agreement technique. The research findings were as follows: The external factors included the current conditions of the automotive industry, government’s policy related to the automotive industry, technology, labor market and human resource development systems of the country. The internal factors included management, productive management, organizational strategies, leadership, organizational culture and philosophy of human resource development. These factors were affected to the different concept of human resources development -the traditional human resource development and the strategies of human resource development. The organization focuses on human resources as intellectual capital and uses the strategies of human resource development in all development processes. The strategies of human resource development will enhance the ability of human resources in the organization and the country.Keywords: human resource development strategy, automotive industry, eco-cars, ASEAN
Procedia PDF Downloads 47114594 Fluctuations of Transfer Factor of the Mixer Based on Schottky Diode
Authors: Alexey V. Klyuev, Arkady V. Yakimov, Mikhail I. Ryzhkin, Andrey V. Klyuev
Abstract:
Fluctuations of Schottky diode parameters in a structure of the mixer are investigated. These fluctuations are manifested in two ways. At the first, they lead to fluctuations in the transfer factor that is lead to the amplitude fluctuations in the signal of intermediate frequency. On the basis of the measurement data of 1/f noise of the diode at forward current, the estimation of a spectrum of relative fluctuations in transfer factor of the mixer is executed. Current dependence of the spectrum of relative fluctuations in transfer factor of the mixer and dependence of the spectrum of relative fluctuations in transfer factor of the mixer on the amplitude of the heterodyne signal are investigated. At the second, fluctuations in parameters of the diode lead to the occurrence of 1/f noise in the output signal of the mixer. This noise limits the sensitivity of the mixer to the value of received signal.Keywords: current-voltage characteristic, fluctuations, mixer, Schottky diode, 1/f noise
Procedia PDF Downloads 58614593 Psychometric Properties and Factor Structure of the College Readiness Questionnaire
Authors: Muna Al-Kalbani, Thuwayba Al Barwani, Otherine Neisler, Hussain Alkharusi, David Clayton, Humaira Al-Sulaimani, Mohammad Khan, Hamad Al-Yahmadi
Abstract:
This study describes the psychometric properties and factor structure of the University Readiness Survey (URS). Survey data were collected from sample of 2652 students from Sultan Qaboos University. Exploratory factor analysis identified ten significant factors underlining the structure. The results of Confirmatory factor analysis showed a good fit to the data where the indices for the revised model were χ2(df = 1669) = 6093.4; CFI = 0.900; GFI =0.926; PCLOSE = 1.00 and RMSAE = 0.030 where each of these indices were above threshold. The overall value of Cronbach’s alpha was 0.899 indicating that the instrument score was reliable. Results imply that the URS is a valid measure describing the college readiness pattern among Sultan Qaboos University students and the Arabic version could be used by university counselors to identify students’ readiness factors. Nevertheless, further validation of the of the USR is recommended.Keywords: college readiness, confirmatory factor analysis, reliability, validity
Procedia PDF Downloads 22614592 Latent Factors of Severity in Truck-Involved and Non-Truck-Involved Crashes on Freeways
Authors: Shin-Hyung Cho, Dong-Kyu Kim, Seung-Young Kho
Abstract:
Truck-involved crashes have higher crash severity than non-truck-involved crashes. There have been many studies about the frequency of crashes and the development of severity models, but those studies only analyzed the relationship between observed variables. To identify why more people are injured or killed when trucks are involved in the crash, we must examine to quantify the complex causal relationship between severity of the crash and risk factors by adopting the latent factors of crashes. The aim of this study was to develop a structural equation or model based on truck-involved and non-truck-involved crashes, including five latent variables, i.e. a crash factor, environmental factor, road factor, driver’s factor, and severity factor. To clarify the unique characteristics of truck-involved crashes compared to non-truck-involved crashes, a confirmatory analysis method was used. To develop the model, we extracted crash data from 10,083 crashes on Korean freeways from 2008 through 2014. The results showed that the most significant variable affecting the severity of a crash is the crash factor, which can be expressed by the location, cause, and type of the crash. For non-truck-involved crashes, the crash and environment factors increase severity of the crash; conversely, the road and driver factors tend to reduce severity of the crash. For truck-involved crashes, the driver factor has a significant effect on severity of the crash although its effect is slightly less than the crash factor. The multiple group analysis employed to analyze the differences between the heterogeneous groups of drivers.Keywords: crash severity, structural structural equation modeling (SEM), truck-involved crashes, multiple group analysis, crash on freeway
Procedia PDF Downloads 38314591 Management as a Proxy for Firm Quality
Authors: Petar Dobrev
Abstract:
There is no agreed-upon definition of firm quality. While profitability and stock performance often qualify as popular proxies of quality, in this project, we aim to identify quality without relying on a firm’s financial statements or stock returns as selection criteria. Instead, we use firm-level data on management practices across small to medium-sized U.S. manufacturing firms from the World Management Survey (WMS) to measure firm quality. Each firm in the WMS dataset is assigned a mean management score from 0 to 5, with higher scores identifying better-managed firms. This management score serves as our proxy for firm quality and is the sole criteria we use to separate firms into portfolios comprised of high-quality and low-quality firms. We define high-quality (low-quality) firms as those firms with a management score of one standard deviation above (below) the mean. To study whether this proxy for firm quality can identify better-performing firms, we link this data to Compustat and The Center for Research in Security Prices (CRSP) to obtain firm-level data on financial performance and monthly stock returns, respectively. We find that from 1999 to 2019 (our sample data period), firms in the high-quality portfolio are consistently more profitable — higher operating profitability and return on equity compared to low-quality firms. In addition, high-quality firms also exhibit a lower risk of bankruptcy — a higher Altman Z-score. Next, we test whether the stocks of the firms in the high-quality portfolio earn superior risk-adjusted excess returns. We regress the monthly excess returns on each portfolio on the Fama-French 3-factor, 4-factor, and 5-factor models, the betting-against-beta factor, and the quality-minus-junk factor. We find no statistically significant differences in excess returns between both portfolios, suggesting that stocks of high-quality (well managed) firms do not earn superior risk-adjusted returns compared to low-quality (poorly managed) firms. In short, our proxy for firm quality, the WMS management score, can identify firms with superior financial performance (higher profitability and reduced risk of bankruptcy). However, our management proxy cannot identify stocks that earn superior risk-adjusted returns, suggesting no statistically significant relationship between managerial quality and stock performance.Keywords: excess stock returns, management, profitability, quality
Procedia PDF Downloads 9314590 Secure Watermarking not at the Cost of Low Robustness
Authors: Jian Cao
Abstract:
This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)
Procedia PDF Downloads 385