Search results for: physical security
7839 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments
Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek
Abstract:
Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking
Procedia PDF Downloads 2847838 Pattern of Physical Activity and Its Impact on the Quality of Life: A Structural Equation Modelling Analysis
Authors: Ali Maksum
Abstract:
In a number of countries, including Indonesia, the tendency for non-communicable diseases is increasing. As a result, health costs must be paid by the state continues to increase as well. People's lifestyles, including due to lack of physical activity, are thought to have contributed significantly to the problem. This study aims to examine the impact of participation in sports on quality of life, which is reflected in three main indicators, namely health, psychological, and social aspects. The study was conducted in the city of Surabaya and its surroundings, with a total of 490 participants, consisting of 245 men and 245 women with an average age of 45.4 years. Data on physical activity and quality of life were collected by questionnaire and analyzed using structural equation modeling. The test results of the model prove that the value of chi-square = 8,259 with p = .409, RMSEA = .008, NFI = .992, and CFI = 1. This means that the model is compatible with the data. The model explains that physical activity has a significant effect on quality of life. People who exercise regularly are better able to cope with stress, have a lower risk of illness, and have higher pro-social behavior. Therefore, it needs serious efforts from stakeholders, especially the government, to create an ecosystem that allows the growth of movement culture in the community.Keywords: participation, physical activity, quality of life, structural equation modelling
Procedia PDF Downloads 1247837 The Influence of Physical Activity and Health Literacy on Depression Level of First and Second Turkish Generation Living in Germany
Authors: Ceren Akyüz, Ingo Froboese
Abstract:
Health literacy has gained importance with the further spread of the coronavirus disease (COVID-19) worldwide and has been associated with health status in various chronic diseases. Many studies indicate that mental health can be improved by low- or moderate-intensity activity, and several studies have been proposed to explain the relationship between physical activity and mental health. The aim of the present study is to investigate the levels of physical activity, health literacy, and depression in first- and- second generation Turkish people in Germany. The research consists of 434 participants (255 females, 179 males; age 38.09 ± 13.73). 40.8 % of participants are married, and 59.2 % of participants are single. Education levels are mostly at university level (54.8 %), and graduate level is 18.9 %. While 24.9 % of the participants are second generation, 75.1 % of participants are first generation. All analyses were stratified on gender, marital status, education, generation and income status, and five age categories: 18–30, 31–40, 41–50, 51–60, and 61–79, which were defined to account for age-specific trends while maintaining sufficient cell size for statistical analysis. A correlation of depression with physical activity and health literacy levels between first- and- second generation Turks in Germany was evaluated in order to find out whether there are significant differences between the two populations and demographic variables (gender, marital status, education, generation, income status) with carrying out questionnaires which are European Health Literacy Survey Questionnaire (HLS-EU-Q47), International Physical Activity Questionnaire ( IPAQ) and the Patient Health Questionnaire-9 (PHQ-9).Keywords: health literacy, turks in germany, migrants, depression, physical activity
Procedia PDF Downloads 827836 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 3817835 Validation of Contemporary Physical Activity Tracking Technologies through Exercise in a Controlled Environment
Authors: Reem I. Altamimi, Geoff D. Skinner
Abstract:
Extended periods engaged in sedentary behavior increases the risk of becoming overweight and/or obese which is linked to other health problems. Adding technology to the term ‘active living’ permits its inclusion in promoting and facilitating habitual physical activity. Technology can either act as a barrier to, or facilitate this lifestyle, depending on the chosen technology. Physical Activity Monitoring Technologies (PAMTs) are a popular example of such technologies. Different contemporary PAMTs have been evaluated based on customer reviews; however, there is a lack of published experimental research into the efficacy of PAMTs. This research aims to investigate the reliability of four PAMTs: two wristbands (Fitbit Flex and Jawbone UP), a waist-clip (Fitbit One), and a mobile application (iPhone Health Application) for recording a specific distance walked on a treadmill (1.5km) at constant speed. Physical activity tracking technologies are varied in their recordings, even while performing the same activity. This research demonstrates that Jawbone UP band recorded the most accurate distance compared to Fitbit One, Fitbit Flex, and iPhone Health Application.Keywords: Fitbit, jawbone up, mobile tracking applications, physical activity tracking technologies
Procedia PDF Downloads 3227834 Mobile Payment over NFC: The M-Check System Case
Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich
Abstract:
The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.Keywords: M-payment, NFC, M-check, M-commerce, security
Procedia PDF Downloads 5977833 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions
Authors: Siddharth Krishnaswamy
Abstract:
Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.Keywords: analysis, food security indicators, response, resilience analysis
Procedia PDF Downloads 3317832 Assessment of Physical Activity Patterns in Patients with Cardiopulmonary Diseases
Authors: Ledi Neçaj
Abstract:
Objectives: The target of this paper is (1) to explain objectively physical activity model throughout three chronic cardiopulmonary conditions, and (2) to study the connection among physical activity dimensions with disease severity, self-reported physical and emotional functioning, and exercise performance. Material and Methods: This is a cross-sectional study of patients in their domestic environment. Patients with cardiopulmonary diseases were: chronic obstructive pulmonary disease (COPD), (n-63), coronary heart failure (n=60), and patients with implantable cardioverter defibrillator (n=60). Main results measures: Seven ambulatory physical activity dimensions (total steps, percentage time active, percentage time ambulating at low, medium, and hard intensity, maximum cadence for 30 non-stop minutes, and peak performance) have been measured with an accelerometer. Results: Subjects with COPD had the lowest amount of ambulatory physical activity compared with topics with coronary heart failure and cardiac dysrhythmias (all 7 interest dimensions, P<.05); total step counts have been: 5319 as opposed to 7464 as opposed to 9570, respectively. Six-minute walk distance becomes correlated (r=.44-.65, P<.01) with all physical activity dimensions inside the COPD pattern, the most powerful correlations being with total steps and peak performance. In topics with cardiac impairment, maximal oxygen intake had the most effective small to slight correlations with five of the physical activity dimensions (r=.22-.40, P<.05). In contrast, correlations among 6-minute walk test distance and physical activity have been higher (r=.48-.61, P<.01) albeit in a smaller pattern of most effective patients with coronary heart failure. For all three samples, self-reported physical and mental health functioning, age, frame mass index, airflow obstruction, and ejection fraction had both exceptionally small and no significant correlations with physical activity. Conclusions: Findings from this study present a profitable benchmark of physical activity patterns in individuals with cardiopulmonary diseases for comparison with future studies. All seven dimensions of ambulatory physical activity have disfavor between subjects with COPD, heart failure, and cardiac dysrhythmias. Depending on the research or clinical goal, the use of one dimension, such as total steps, may be sufficient. Although physical activity had high correlations with performance on a six-minute walk test relative to other variables, accelerometers-based physical activity monitoring provides unique, important information about real-world behavior in patients with cardiopulmonary not already captured with existing measures.Keywords: ambulatory physical activity, walking, monitoring, COPD, heart failure, implantable defibrillator, exercise performance
Procedia PDF Downloads 867831 Inclusive Business and Its Contribution to Farmers Wellbeing in Arsi Ethiopia: Empirical Evidence
Authors: Senait G. Worku, Ellen Mangnus
Abstract:
Inclusive business models which integrates low-income people with companies value chain in a commercially viable way has gained momentum for the perceived potential to contribute to poverty alleviation and food security in developing countries. This article investigates the impact of Community Revenue Enhancement through Technology Extension (CREATE) project of Heineken brewery on smallholder farmers’ wellbeing in Arsi zone Oromia regional state of Ethiopia. CREATE is a Public-Private Partnership (PPP) between Ministry of Foreign Affairs of the Netherlands and Heineken N.V. which source malt barely from smallholder farmers in three zones of Oromia. The study assessed the impact of CREATE on malt barley productivity, food security and new asset purchase in Arsi zone by comparing households that participate in the project with non-participating households using propensity score matching method. The finding indicated that households that participated in the CREATE project had higher malt barley productivity and purchased more new assets than non-participating households. However, there is no significant difference on food security status of participating and non-participating households indicating that the project has a profound impact on asset accumulation than on food security improvement.Keywords: inclusive business, malt barley, propensity score matching, wellbeing
Procedia PDF Downloads 1567830 Password Cracking on Graphics Processing Unit Based Systems
Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik
Abstract:
Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.Keywords: GPGPU, password cracking, secret key, user authentication
Procedia PDF Downloads 2907829 Impact of Pediatric Cardiac Rehabilitation on the Physical Condition of Children with Congenital Heart Defects
Authors: Hady Atef Labib
Abstract:
Pediatric cardiac rehabilitation has the potential to benefit many children with congenital heart defects (CHD). Instead of excellent surgical results most of children usually present with a depression of physical condition so early rehabilitation program is recommended to avoid that decline in physical tolerance and prevent any post surgical complications. Unfortunately, the limited experience with and availability of these programs has caused the benefits of cardiac rehabilitation to be unavailable to most children with CHD. Therefore, it is recommended to study that field in more detail and apply it on wider scale.Keywords: pediatric cardiac rehabilitation, congenital heart disease, quality of life, pediatric
Procedia PDF Downloads 3787828 Research on the Correlation between College Students' Physical Fitness and Running Habits: Data Mining of Smart Phone Sports App
Authors: Mingming Guo, Xiaozan Wang
Abstract:
Introduction: The purpose of this study is to examine the correlation between the physical fitness of Chinese college students and their daily running habits (RH). Methods: A total of 718 college students from East China Normal University participated in this study (385 boys and 333 girls). Each participant participated in the Chinese Students’ Physical Fitness Test during the 2018-2019 school year. In addition, each student is also required to use the app to record all their running results during each run during the 2018-2019 school year. Researchers can query and export all running records through the app's management platform. Results: (1) The total number of kilometers run by the students showed a significant negative correlation with their vital capacity (VC), sitting body flexion (SBF), and long jump (LJ) (rᵥKeywords: college students, physical fitness, running habits, data mining
Procedia PDF Downloads 1397827 Lived Experiences of Physical Education Teachers in the New Normal: A Consensual Qualitative Research
Authors: Karl Eddie T. Malabanan
Abstract:
Due to the quick transmission and public health risk of coronavirus disease, schools and universities have shifted to distant learning. Teachers everywhere were forced to shift gears instantly in order to react to the needs of students and families using synchronous and asynchronous virtual teaching. This study aims to explore the lived experiences of physical education teachers who are currently experiencing remote learning in teaching during the time of the COVID-19 pandemic. Specifically, the challenges that the physical education teachers encounter during remote learning and teaching. The participants include 12 physical education teachers who have taught in higher education institutions for at least five years. The researcher utilized qualitative research; specifically, the researcher used Consensual Qualitative Research (CQR). The results of this study showed that there are five categories for the Lived Experiences of Physical Education Teachers with thirty-one subcategories. This study revealed that physical education teachers experienced very challenging situations during the time of the pandemic. It also found that students had challenges in the abrupt transition from traditional to virtual learning classes, but it also showed that students are tenacious and willing to face any adversity. The researcher also finds that teachers are mentally drained during this time. Furthermore, one of the main focuses for the teachers should be on improving their well-being. And lastly, to cope with the challenges, teachers employ socializing to relieve tension and anxiety.Keywords: lived experiences, consensual qualitative research, pandemic, education
Procedia PDF Downloads 927826 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks
Authors: Mehmet Karaata
Abstract:
Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security
Procedia PDF Downloads 4427825 Static Analysis of Security Issues of the Python Packages Ecosystem
Authors: Adam Gorine, Faten Spondon
Abstract:
Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks
Procedia PDF Downloads 1397824 The Mission Slimpossible Program: Dietary and Physical Activity Intervention to Combat Obesity among University Students in UITM Puncak Alam
Authors: Kartini Ilias, Nabilah Md Ahir, Nor Zafirah Ab Rahman, Safiah Md Yusof, Nuri Naqieyah Radzuan, Siti Sabariah Buhari
Abstract:
This study aim to develop and assess the effectiveness of an intervention in improving eating habits and physical activity level of university students of UiTM Puncak Alam. The intervention consists of weekly dietary counselling by registered dietitian and high-intensity interval training (HIIT) for three times per week for the duration of 8 weeks. A total of 25 students from the intervention group and 25 students from control group who had BMI equal to or greater than 25kg/m² participated in the study. The results showed a significant reduction in body weight (3.0 kg), body fat percentage (7.9 %), waist circumference (7.3 cm) and BMI (2.9 kg/m²) between pre and post intervention. Besides, there was a significant increase in the level of physical activity among subjects in intervention group. In conclusion, the intervention made an impact on eating habit, physical activity level and improves weight status of the students. It is expected that the intervention could be adopted and implemented by the government and private sector as well as policy-makers in formulating obesity intervention.Keywords: obesity, diet, obesity intervention, physical activity
Procedia PDF Downloads 3787823 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 1637822 Mixed Treatment (Physical-Chemical and Biological) of Ouled Fayet Landfill Leachates
Authors: O. Balamane-Zizi, L. M. Rouidi, A. Boukhrissa, N. Daas, H. Ait-amar
Abstract:
The objective of this study was to test the possibility of a mixed treatment (physical-chemical and biological) of Ouled Fayet leachates which date of 10 years and has a large fraction of hard COD that can be reduced by coagulation-flocculation. Previous batch tests showed the possibility of applying the physical-chemical and biological treatments separately; the removal efficiencies obtained in this case were not interesting. We propose, therefore, to test the possibility of a combined treatment, in order to improve the quality of the leachates. Estimation of the treatment’s effectiveness was done by analysis of some pollution parameters such as COD, suspended solids, and heavy metals (particularly iron and nickel). The main results obtained after the combination of treatments, show reduction rate of about 63% for COD, 73% for suspended solids and 80% for iron and nickel. We also noted an improvement in the turbidity of treated leachates.Keywords: landfill leachates, COD, physical-chemical treatment, biological treatment
Procedia PDF Downloads 4737821 Impact of Stress on Physical-Mental Wellbeing of Working Women in India: Awareness and Acceptability
Authors: Meera Shanker
Abstract:
Excellent education and financial need have encouraged Indian women to go out and work in well-paid and high-status occupations. In the era of cutthroat competition, women are expected to work hard to produce the desired result; hence, workload and expectations haveincreased. At home, they are anticipated to take care of family members, children, and household work. Women are stretching themselves mechanically to remain in the job competition and try to give their best at home. Consequentially, they are under tremendous pressure, stressed, and having issues related to physical-mental wellness. Mental healthcare is often ignored and not accepted due to a lack of awareness and cultural barriers. These further compounds the problem, resulting in decreased productivity in economic terms and an increase in stress-related physical-mental ailments. The main objective of the study was to find out the impact of stress on the physical-mental wellbeing of working women in India, along with their awareness and acceptability related to mental health. Six hundred and one woman working at various levels took part in this study, responding to the items related to stress and physical-mental illness. Finally, 21 items were retained under four meaningful factors measuring stress dimensions along with 17 items with three factors measuring physical-mental wellbeing. Confirmatory Factor Analysis (CFA), path analysis, in Structural Equation Modeling (SEM), was used to get a relationship, validity of the instruments. The psychometric properties of items and Cronbach’s Alpha reliabilities calculated for the subscales were relatively acceptable. The subscale correlations, regression, and path analysis of stress dimensions with physical-mental illness were found to be positive, indicating the growing stress among working women in India, which is impacting their physical-mental health. Single item analysis revealed that 77 percent of women have never visited psychologists. However, 70 percent of working women were not ready to seek the help of a psychologist.Keywords: working women, stress, physical-mental well-being, confirmatory factor analysis
Procedia PDF Downloads 1857820 Quality of Life of Elderly and Factors Associated in Bharatpur Metropolitan City, Chitwan: A Mixed Method Study
Authors: Rubisha Adhikari, Rajani Shah
Abstract:
Introduction: Aging is a natural, global and inevitable phenomenon every single person has to go through, and nobody can escape the process. One of the emerging challenges to public health is to improve the quality of later years of life as life expectancy continues to increase. Quality of life (QoL) has grown to be a key goal for many public health initiatives. Population aging has become a global phenomenon as they are growing more quickly in emerging nations than they are in industrialized nations, leaving minimal opportunities to regulate the consequences of the demographic shift. Methods: A community-based descriptive analytical approach was used to examine the quality of life and associated factors among elderly people. A mixed method was chosen for the study. For the quantitative data collection, a household survey was conducted using the WHOQOL-OLD tool. In-depth interviews were conducted among twenty participants for qualitative data collection. Data generated through in-depth interviews were transcribed verbatim. In-depth interviews lasted about an hour and were audio recorded. The in-depth interview guide had been developed by the research team and pilot-tested before actual interviews. Results: This study result showed the association between quality of life and socio-demographic variables. Among all the variables under socio-demographic variable of this study, age (ꭓ2=14.445, p=0.001), gender (ꭓ2=14.323, p=<0.001), marital status (ꭓ2=10.816, p=0.001), education status (ꭓ2=23.948, p=<0.001), household income (ꭓ2=13.493, p=0.001), personal income (ꭓ2=14.129, p=0.001), source of personal income (ꭓ2=28.332,p=<0.001), social security allowance (ꭓ2=18.005,p=<0.001), alcohol consumption (ꭓ2=9.397,p=0.002) are significantly associated with quality of life of elderly. In addition, affordability (ꭓ2=12.088, p=0.001), physical activity (ꭓ2=9.314, p=0.002), emotional support (ꭓ2=9.122, p=0.003), and economic support (ꭓ2=8.104, p=0.004) are associated with quality of life of elderly people. Conclusion: In conclusion, this mixed method study provides insight into the attributes of the quality of life of elderly people in Nepal and similar settings. As the geriatric population is growing in full swing, maintaining a high quality of life has become a major challenge. This study showed that determinants such as age, gender, marital status, education status, household income, personal income, source of personal income, social security allowance and alcohol consumption, economic support, emotional support, affordability and physical activity have an association with quality of life of the elderly.Keywords: ageing, chitwan, elderly, health status, quality of life
Procedia PDF Downloads 687819 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 1077818 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 3347817 Evaluating Effects of Health and Physical Maintenance on Academic Competencies of University Teachers in Pakistan
Authors: Muhammad Badar Habib, Muhammad Shakir, Asif Ali, Muhammad Zia ul Haq
Abstract:
Purpose of the research is to examine the university teachers’ health and physical activities regarding their academic competencies. Major objectives of this piece research were (a) to identify health problems of teachers at university level that affects academic competencies of university teachers and (b) to evaluate educational betterment through physical balance. This research is descriptive in nature and questionnaire was used as source of collecting data. Population of the present research comprises teachers, professors and professionals teaching in the universities of Pakistan. 580 university teachers were selected as a population of the study. Random sampling technique was used to identify recipients. Data was feed and filter in Ms-Excel. In the light of the analysis of the study following findings were drawn out. This study found that the university teachers in Pakistan do not adopt proper physical exercise program. They were less interested to burn their extra calories and face diseases such as cramping, contraction of the muscles, diabetics and stomach diseases. This study recommends that seminars/workshops may be held by University establishment; to develop overall awareness among the teachers.Keywords: evaluating effects of health and physical maintenance, academic competencies, university teachers, Pakistan
Procedia PDF Downloads 4577816 The Effect of Physical and Functional Structure on Citizens` Social Behavior: Case Study of Valiasr Crossroads, Tehran, Iran
Authors: Seyedeh Samaneh Hosseini Yousefi
Abstract:
Space does not play role just in mentioning the place or locations. It also takes part in people attendance and social structures. Urban space is of substantial aspects of city which is a public sphere for free and unlimited appearance of citizens. Along with such appearances and regarding physical, environmental and functional conditions, different personal and social behaviors can be seen and analyzed toward people. The main principle of an urban space is including social relations and communications. In this survey, urban space has been referred to one in which physical, environmental and functional attractions cause pause and staying of people. Surveys have shown that urban designers have discussed about place more than architects or planners. With attention to mutual relations between urban space, society and civilization, proper policy making and planning are essential due to achieving an ideal urban space. The survey has been decided to analyze the effect of functional and physical structure of urban spaces on citizens' social behaviors. Hence, Valiasr crossroads, Tehran identified public space, has been selected in which analytic-descriptive method utilized. To test the accuracy of assumptions, statistical test has been accomplished by SPSS. Findings have shown that functional structure affects social behaviors, relations, integration and participation more than physical structure does.Keywords: citizens' social behavior, functional structure, physical structure, urban space
Procedia PDF Downloads 4997815 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana
Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.
Abstract:
Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security
Procedia PDF Downloads 1067814 Feasibility Study of Iraq' Decomposition and Its Effects on the Region
Authors: Ebrahim Rahmani, Siyamak Moazeni
Abstract:
According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan
Procedia PDF Downloads 3287813 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 2697812 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 5477811 Detecting Black Hole Attacks in Body Sensor Networks
Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai
Abstract:
This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++
Procedia PDF Downloads 6457810 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review
Authors: Gholamreza Farrokhi, Behzad Sani
Abstract:
The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future
Procedia PDF Downloads 357