Search results for: network security techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12945

Search results for: network security techniques

12285 A Review of Literature for Online Social Network Business Continuance Intention and the Hypotheses Thereof

Authors: Akwesi Assensoh-Kodua

Abstract:

Online Social Networks (OSN) has come and gone, yet the explosion of business activities on such platforms continuous to surge high, giving advantage to the bold entrepreneurs. It is therefore a practical requirement that practitioners and researchers understand the key determinants of costumers’ online social network business activities and continuance intention. An exploratory literature research to examine OSN continuous intention of business participants on OSN revealed that the practice of doing business on social network has come to stay and the following factors are the likely drivers for this new business model: perceived trust, perceived ease of use, confirmation, habit, social norm, perceived behavioural control, expected benefit, and satisfaction are the most probable factors that can lead to online social network (OSN) continuance intention.

Keywords: online social network, continuance intention, business continuance

Procedia PDF Downloads 492
12284 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 149
12283 Optimizing Network Latency with Fast Path Assignment for Incoming Flows

Authors: Qing Lyu, Hang Zhu

Abstract:

Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.

Keywords: flow path, latency, middlebox, network

Procedia PDF Downloads 201
12282 Water End-Use Classification with Contemporaneous Water-Energy Data and Deep Learning Network

Authors: Khoi A. Nguyen, Rodney A. Stewart, Hong Zhang

Abstract:

‘Water-related energy’ is energy use which is directly or indirectly influenced by changes to water use. Informatics applying a range of mathematical, statistical and rule-based approaches can be used to reveal important information on demand from the available data provided at second, minute or hourly intervals. This study aims to combine these two concepts to improve the current water end use disaggregation problem through applying a wide range of most advanced pattern recognition techniques to analyse the concurrent high-resolution water-energy consumption data. The obtained results have shown that recognition accuracies of all end-uses have significantly increased, especially for mechanised categories, including clothes washer, dishwasher and evaporative air cooler where over 95% of events were correctly classified.

Keywords: deep learning network, smart metering, water end use, water-energy data

Procedia PDF Downloads 302
12281 Design of Local Interconnect Network Controller for Automotive Applications

Authors: Jong-Bae Lee, Seongsoo Lee

Abstract:

Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates.

Keywords: local interconnect network, controller, transceiver, processor

Procedia PDF Downloads 284
12280 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 534
12279 Migratory Trajectory of Transnational Street Beggars in South Western, Nigeria

Authors: Usman Adekunle Ojedokun, Adeyinka Abideen Aderinto

Abstract:

Migration remains an important course of action often resort-to by human and some other classes of animal for survival in the face of life-threatening conditions. However, the activity of certain group of immigrants, who are exploiting the socio-economic and environmental challenges in their home countries to conduct street begging across different countries in Africa, is fast becoming a major cause for concern. This paper examined the migratory trajectory of transnational street beggars in South Western, Nigeria. Strain and Migration Network Theories were adopted for the study. The methods of data collection were survey questionnaire, in-depth interview, and key informant interview. Convenience and purposive sampling techniques were employed for the selection of 395 transnational street beggars and 4 key informants were purposively chosen. Findings revealed that transnational street beggars immigrated into Nigeria all year round and all of them came by road. Also, while some of them entered the country officially, others gained entry illegally. The majority (29.3%) arrived through Sokoto, a border State to some neighbouring countries. This study calls for more security measures at the Nigerian borders as a way of controlling the influx of this category of beggars into the country.

Keywords: transnational street beggars, street begging, migration, Nigeria

Procedia PDF Downloads 248
12278 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 63
12277 Multiple Fault Detection and Classification in a Coupled Motor with Rotor Using Artificial Neural Network

Authors: Mehrdad Nouri Khajavi, Gollamhassan Payganeh, Mohsen Fallah Tafti

Abstract:

Fault diagnosis is an important aspect of maintaining rotating machinery health and increasing productivity. Many researches has been done in this regards. Many faults such as unbalance, misalignment, looseness, bearing faults, etc. have been considered and diagnosed with different techniques. Most of the researches in fault diagnosis of rotating machinery deal with single fault. Where as in reality faults usually occur simultaneously and it is, therefore, necessary to recognize them at the same time. In this research, two of the most common faults namely unbalance and misalignment have been considered simultaneously with different intensity and then identified and classified with the use of Multi-Layer Perception Neural Network (MLPNN). Processed Vibration signals are used as the input to the MLPNN, and the class of mixed unbalancy, and misalignment is the output of the NN.

Keywords: unbalance, parallel misalignment, combined faults, vibration signals

Procedia PDF Downloads 348
12276 Thick Data Analytics for Learning Cataract Severity: A Triplet Loss Siamese Neural Network Model

Authors: Jinan Fiaidhi, Sabah Mohammed

Abstract:

Diagnosing cataract severity is an important factor in deciding to undertake surgery. It is usually conducted by an ophthalmologist or through taking a variety of fundus photography that needs to be examined by the ophthalmologist. This paper carries out an investigation using a Siamese neural net that can be trained with small anchor samples to score cataract severity. The model used in this paper is based on a triplet loss function that takes the ophthalmologist best experience in rating positive and negative anchors to a specific cataract scaling system. This approach that takes the heuristics of the ophthalmologist is generally called the thick data approach, which is a kind of machine learning approach that learn from a few shots. Clinical Relevance: The lens of the eye is mostly made up of water and proteins. A cataract occurs when these proteins at the eye lens start to clump together and block lights causing impair vision. This research aims at employing thick data machine learning techniques to rate the severity of the cataract using Siamese neural network.

Keywords: thick data analytics, siamese neural network, triplet-loss model, few shot learning

Procedia PDF Downloads 105
12275 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 77
12274 Evidence-Based Policy Making to Improve Human Security in Pakistan

Authors: Ayesha Akbar

Abstract:

Pakistan is moving from a security state to a welfare state despite several security challenges both internal and external. Human security signifies a varied approach in different regions depending upon the leadership and policy priorities. The link between human development and economic growth is not automatic. It has to be created consciously by forward-looking policies and strategies by national governments. There are seven components or categories of human security these include: Economic Security, Personal Security, Health Security, Environmental Security, Food Security, Community Security and Political Security. The increasing interest of the international community to clearly understand the dimensions of human security provided the grounds to Pakistani scholars as well to ponder on the issue and delineate lines of human security. A great deal of work has been either done or in process to evaluate human security indicators in Pakistan. Notwithstanding, after having been done a great deal of work the human security in Pakistan is not satisfactory. A range of deteriorating indicators of human development that lies under the domain of human security leaves certain inquiries to be answered. What are the dimensions of human security in Pakistan? And how are they being dealt from the perspective of policy and institution in terms of its operationalization in Pakistan? Is the human security discourse reflects evidence-based policy changes. The methodology is broadly based on qualitative methods that include interviews, content analysis of policy documents. Pakistan is among the most populous countries in the world and faces high vulnerability to climate change. Literacy rate has gone down with the surge of youth bulge to accommodate in the job market. Increasing population is creating food problems as the resources have not been able to compete with the raising demands of food and other social amenities of life. Majority of the people are facing acute poverty. Health outcomes are also not satisfactory with the high infant and maternal mortality rate. Pakistan is on the verge of facing water crisis as the water resources are depleting so fast with the high demand in agriculture and energy sector. Pakistan is striving hard to deal with the declining state of human security but the dilemma is lack of resources that hinders in meeting up with the emerging demands. The government requires to bring about more change with scaling-up economic growth avenues with enhancing the capacity of human resources. A modern performance drive culture with the integration of technology is required to deliver efficient and effective service delivery. On an already fast track process of reforms; e-governance and evidence based policy mechanism is being instilled in the government process for better governance and evidence based decisions.

Keywords: governance, human development index, human security, Pakistan, policy

Procedia PDF Downloads 249
12273 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 386
12272 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J

Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa

Abstract:

A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.

Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index

Procedia PDF Downloads 132
12271 Social Network Analysis in Water Governance

Authors: Faribaebrahimi, Mehdi Ghorbani, Mohsen Mohsenisaravi

Abstract:

Ecosystem management is complex because of natural and human issues. To cope with this complexity water governance is recommended since it involves all stakeholders including people, governmental and non-governmental organization who related to environmental systems. Water governance emphasizes on water co-management through consideration of all the stakeholders in the form of social and organizational network. In this research, to illustrate indicators of water governance in Dorood watershed, in Shemiranat region of Iran, social network analysis had been applied. The results revealed that social cohesion among pastoralists in Dorood is medium because of trust links, while link sustainability is weak to medium. According to the results, some pastoralists have high social power and therefore are key actors in the utilization network, regarding to centrality index and trust links. The results also demonstrated that Agricultural Development Office and (Shemshak-Darbandsar Islamic) Council are key actors in rangeland co-management, based on centrality index in rangeland institutional network at regional scale in Shemiranat district.

Keywords: social network analysis, water governance, organizational network, water co-management

Procedia PDF Downloads 348
12270 Analysis of the Omnichannel Delivery Network with Application to Last Mile Delivery

Authors: Colette Malyack, Pius Egbelu

Abstract:

Business-to-Customer (B2C) delivery options have improved to meet increased demand in recent years. The change in end users has forced logistics networks to focus on customer service and sentiment that would have previously been the priority of the company or organization of origin. This has led to increased pressure on logistics companies to extend traditional B2B networks into a B2C solution while accommodating additional costs, roadblocks, and customer sentiment; the result has been the creation of the omnichannel delivery network encompassing a number of traditional and modern methods of package delivery. In this paper the many solutions within the omnichannel delivery network are defined and discussed. It can be seen through this analysis that the omnichannel delivery network can be applied to reduce the complexity of package delivery and provide customers with more options. Applied correctly the result is a reduction in cost to the logistics company over time, even with an initial increase in cost to obtain the technology.

Keywords: network planning, last mile delivery, omnichannel delivery network, omnichannel logistics

Procedia PDF Downloads 148
12269 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 381
12268 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms

Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov

Abstract:

Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.

Keywords: adaptation, biodiversity, food security, water reservoir, risk

Procedia PDF Downloads 250
12267 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 223
12266 Optimization of Interface Radio of Universal Mobile Telecommunication System Network

Authors: O. Mohamed Amine, A. Khireddine

Abstract:

Telecoms operators are always looking to meet their share of the other customers, they try to gain optimum utilization of the deployed equipment and network optimization has become essential. This project consists of optimizing UMTS network, and the study area is an urban area situated in the center of Algiers. It was initially questions to become familiar with the different communication systems (3G) and the optimization technique, its main components, and its fundamental characteristics radios were introduced.

Keywords: UMTS, UTRAN, WCDMA, optimization

Procedia PDF Downloads 378
12265 Perceptions on Development of the Deaf in Higher Education Level: The Case of Special Education Students in Tiaong, Quezon, Philippines

Authors: Ashley Venerable, Rosario Tatlonghari

Abstract:

This study identified how college deaf students of Bartimaeus Center for Alternative Learning in Tiaong, Quezon, Philippines view development using visual communication techniques and generating themes from responses. Complete enumeration was employed. Guided by Constructivist Theory of Perception, past experiences and stored information influenced perception. These themes of development emerged: social development; pleasant environment; interpersonal relationships; availability of resources; employment; infrastructure development; values; and peace and security. Using the National Economic and Development Authority development indicators, findings showed the deaf students’ views on development were similar from the mainstream views. Responses also became more meaningful through visual communication techniques.

Keywords: deaf, development, perception, development indicators, visual communication

Procedia PDF Downloads 426
12264 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case

Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan

Abstract:

The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.

Keywords: cloud computing, protocols, UDP multicast, virtualization

Procedia PDF Downloads 588
12263 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems

Authors: Adeniyi Onasanya, Maher Elshakankiri

Abstract:

In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.

Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services

Procedia PDF Downloads 173
12262 Migration, Food Security, Rapid Urbanization and Population Rise in Nigeria: A Wake-Up Call to Policy-Makers

Authors: A. E. Obayelu, S. O. Olubiyo

Abstract:

Food is different from other commodities because everybody needs food for survival. This has led to a shift in focus to food security in the global policy arena. However, there is paucity of studies on the interactions between food security, migration, urbanization and population rise. This paper therefore look at the linkages between migration and food security in the context of rapid urbanization and population rise of Nigeria. The study obtained data and information from both secondary sources and primary method through the voice of some selected Nigerians through telephone interview. The findings revealed that, the primary factor for the rapid urbanization in Nigeria is migration; most foods are still produced by peasant farmers who are scattered all over the rural areas and not multinational companies who produce on large scale. The country is still characterized with inadequate infrastructural facilities and services to cater for growing population. There are no protective policies enforced by the Nigeria government. In most cases, the migrants are left entirely on mercy of what they can find to due for survival. The most common coping mechanisms by migrants from rural to urban areas are changing food intake in terms of quantity, quality, diversity and frequency and prioritizing children. Policies that address urban food security need to consider the complex relationship between rapid population rise and migration and appropriate transformations that will be able to manage urbanization. With increasing rate of urbanization, the focus of food security should no longer be that of rural only

Keywords: agricultural commercialization, agricultural transformation, food security, urban, urbanization

Procedia PDF Downloads 421
12261 Urban Land Cover from GF-2 Satellite Images Using Object Based and Neural Network Classifications

Authors: Lamyaa Gamal El-Deen Taha, Ashraf Sharawi

Abstract:

China launched satellite GF-2 in 2014. This study deals with comparing nearest neighbor object-based classification and neural network classification methods for classification of the fused GF-2 image. Firstly, rectification of GF-2 image was performed. Secondly, a comparison between nearest neighbor object-based classification and neural network classification for classification of fused GF-2 was performed. Thirdly, the overall accuracy of classification and kappa index were calculated. Results indicate that nearest neighbor object-based classification is better than neural network classification for urban mapping.

Keywords: GF-2 images, feature extraction-rectification, nearest neighbour object based classification, segmentation algorithms, neural network classification, multilayer perceptron

Procedia PDF Downloads 386
12260 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network

Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang

Abstract:

As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.

Keywords: GUI, deep learning, GAN, data augmentation

Procedia PDF Downloads 178
12259 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation

Authors: Elaheh Vaezpour

Abstract:

Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.

Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption

Procedia PDF Downloads 332
12258 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 335
12257 Food Security in the Middle East and North Africa

Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz

Abstract:

To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.

Keywords: diet, food insecurity, global food security index, nutrition, sustainability

Procedia PDF Downloads 351
12256 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 107