Search results for: secure communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1220

Search results for: secure communications

530 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 168
529 The Complaint Speech Act Set Produced by Arab Students in the UAE

Authors: Tanju Deveci

Abstract:

It appears that the speech act of complaint has not received as much attention as other speech acts. However, the face-threatening nature of this speech act requires a special attention in multicultural contexts in particular. The teaching context in the UAE universities, where a big majority of teaching staff comes from other cultures, requires investigations into this speech act in order to improve communication between students and faculty. This session will outline the results of a study conducted with this purpose. The realization of complaints by Freshman English students in Communication courses at Petroleum Institute was investigated to identify communication patterns that seem to cause a strain. Data were collected using a role-play between a teacher and students, and a judgment scale completed by two of the instructors in the Communications Department. The initial findings reveal that the students had difficulty putting their case, produced the speech act of criticism along with a complaint and that they produced both requests and demands as candidate solutions. The judgement scales revealed that the students’ attitude was not appropriate most of the time and that the judges would behave differently from students. It is concluded that speech acts, in general, and complaint, in particular, need to be taught to learners explicitly to improve interpersonal communication in multicultural societies. Some teaching ideas are provided to help increase foreign language learners’ sociolinguistic competence.

Keywords: speech act, complaint, pragmatics, sociolinguistics, language teaching

Procedia PDF Downloads 490
528 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.

Keywords: caliphate, jihad, ASEAN, counterterrorism, social community

Procedia PDF Downloads 215
527 Ama de Casa: Gender Division of Labor the Response to Environmental and Economic Constraints, Ecuador

Authors: Tyrus C. Torres, Michael Harris

Abstract:

In a coastal town of Ecuador, the role of women is commonly defined as an ama de casa, a woman who works in the house, raises children, and contributes to the community. This project, under the guidance of Dr. Michael Harris from the Florida Atlantic University, seeks to understand how the role of an ama de casa provides a secure environment for men and women, coexists with economic and environmental constraints that explain the origins of how this environment has been formed. The coastal community aspects of familia (family), trabajo (work), relación (relationships), machismo (masculinity), feminista (femininity), and the culture of Ecuador define the ways of life in a coastal setting. This ethnographic research project included the following methodologies: environment mapping, conducting interviews, surveys, participant observation, direct and indirect observations, and integration into daily life. Immersion into the daily life and building relationships with the local people allowed the documentation of intricacies of both the cultural and social spheres. The findings of this research offer insight on how culture, economics, and environment can form female and male agency. Our investigation shows that occupations such as fishermen, laborers, ama de casas, and even students utilize occupational routes to create social agency in the face of economic and environmental constraints in Ecuador.

Keywords: Ecuador, ethnography, gender division of labor, gender roles

Procedia PDF Downloads 220
526 Multimodal Database of Retina Images for Africa: The First Open Access Digital Repository for Retina Images in Sub Saharan Africa

Authors: Simon Arunga, Teddy Kwaga, Rita Kageni, Michael Gichangi, Nyawira Mwangi, Fred Kagwa, Rogers Mwavu, Amos Baryashaba, Luis F. Nakayama, Katharine Morley, Michael Morley, Leo A. Celi, Jessica Haberer, Celestino Obua

Abstract:

Purpose: The main aim for creating the Multimodal Database of Retinal Images for Africa (MoDRIA) was to provide a publicly available repository of retinal images for responsible researchers to conduct algorithm development in a bid to curb the challenges of ophthalmic artificial intelligence (AI) in Africa. Methods: Data and retina images were ethically sourced from sites in Uganda and Kenya. Data on medical history, visual acuity, ocular examination, blood pressure, and blood sugar were collected. Retina images were captured using fundus cameras (Foru3-nethra and Canon CR-Mark-1). Images were stored on a secure online database. Results: The database consists of 7,859 retinal images in portable network graphics format from 1,988 participants. Images from patients with human immunodeficiency virus were 18.9%, 18.2% of images were from hypertensive patients, 12.8% from diabetic patients, and the rest from normal’ participants. Conclusion: Publicly available data repositories are a valuable asset in the development of AI technology. Therefore, is a need for the expansion of MoDRIA so as to provide larger datasets that are more representative of Sub-Saharan data.

Keywords: retina images, MoDRIA, image repository, African database

Procedia PDF Downloads 102
525 Building Energy Modeling for Networks of Data Centers

Authors: Eric Kumar, Erica Cochran, Zhiang Zhang, Wei Liang, Ronak Mody

Abstract:

The objective of this article was to create a modelling framework that exposes the marginal costs of shifting workloads across geographically distributed data-centers. Geographical distribution of internet services helps to optimize their performance for localized end users with lowered communications times and increased availability. However, due to the geographical and temporal effects, the physical embodiments of a service's data center infrastructure can vary greatly. In this work, we first identify that the sources of variances in the physical infrastructure primarily stem from local weather conditions, specific user traffic profiles, energy sources, and the types of IT hardware available at the time of deployment. Second, we create a traffic simulator that indicates the IT load at each data-center in the set as an approximator for user traffic profiles. Third, we implement a framework that quantifies the global level energy demands using building energy models and the traffic profiles. The results of the model provide a time series of energy demands that can be used for further life cycle analysis of internet services.

Keywords: data-centers, energy, life cycle, network simulation

Procedia PDF Downloads 128
524 Global Indicators of Successful Remote Monitoring Adoption Applying Diffusion of Innovation Theory

Authors: Danika Tynes

Abstract:

Innovations in technology have implications for sustainable development in health and wellness. Remote monitoring is one innovation for which the evidence-base has grown to support its viability as a quality healthcare delivery adjunct. This research reviews global data on telehealth adoption, in particular, remote monitoring, and the conditions under which its success becomes more likely. System-level indicators were selected to represent four constructs of DoI theory (relative advantage, compatibility, complexity, and observability) and assessed against 5 types of Telehealth (Teleradiology, Teledermatology, Telepathology, Telepsychology, and Remote Monitoring) using ordinal logistic regression. Analyses include data from 84 countries, as extracted from the World Health Organization, World Bank, ICT (Information Communications Technology) Index, and HDI (Human Development Index) datasets. Analyses supported relative advantage and compatibility as the strongest influencers of remote monitoring adoption. Findings from this research may help focus on the allocation of resources, as a sustainability concern, through consideration of systems-level factors that may influence the success of remote monitoring adoption.

Keywords: remote monitoring, diffusion of innovation, telehealth, digital health

Procedia PDF Downloads 112
523 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 37
522 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal

Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube

Abstract:

The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.

Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS

Procedia PDF Downloads 33
521 Mediation Effect of Mindful Parenting on Parental Self Efficacy and Parent-Child Attachment in Hong Kong

Authors: Man Chung Chu

Abstract:

In the dynamic family interaction, parental self-efficacy is connected with parent-child attachment. Parental self-efficacy and its corresponding behavior played an influential role in the lifespan development of the child. Recently, Mindful parenting is popularly addressed as it lightens parents’ awareness to their own thoughts feelings and behaviors by adapting a nonjudgmental attitude in the present moment being with the child. The effectiveness of mindful parent is considerably significant in enhancing parent-child relationship as well as family functioning. Parenting in early developmental stage is always challenging and essential for later growth, however, literature is rarely exploring the mediation of mindful parenting on the effect of parent self-efficacy on parent-child attachment in preschoolers’ families. The mediation effect of the research shed light on how mindful parenting should head, where parental self-efficacy training should be incorporated together with mindful family program in attempt to yield the best outcome in the family of young-aged children. Two hundred and eight (208) parents, of two to six years old children, were participated in the study and results supported the significance in the mediator effect of mindful parenting in both facets, i.e. Parent-focused - ‘Mindful Discipline’ and Child-focused – ‘Being in the moment with the child’ where parental self-efficacy is a significant predictor of mindful parenting. The implication of the result suggests that mindful parenting would be a therapeutic framework in promoting family functioning and child’s well-being, it would also be a ‘significant helping hand’ in maintaining continuous secure attachment relationship and growing their mindful children in a family.

Keywords: mediation effect, mindful parenting, parental self efficacy, parent-child attachment, preschoolers

Procedia PDF Downloads 184
520 The Relationship between Infill Development Indicators and Quality of Life in Urban Neighborhoods

Authors: S. Mohammad Reza Khatibi

Abstract:

Statistics on urbanization in Iran and around the world show that urbanization rate and urban population had had an increasing growth and, during five decades, this trend shows the fact that growth will still continue for a long time. Therefore, instead of an irregular horizontal city development and growth, a sustainable development is achievable by filling the existing city fabric, organizing the density and changing the use of incompatible old or urban buildings. One approach is the infill development. Infill development is the development of vacant land or wasteland abandoned within built areas or where there already exist facilities and equipment. Simply put, infill development is the use of empty spaces or those lacking intra-city use for city development. Additionally, fulfillment of social justice and creating a safe, secure and desirable atmosphere for citizens to live and stay active along with acquiring equal life opportunities, are among the goals of vision plan of Iran in conflict with which, certain environments have been created by city neighborhoods having physical, social, economic, etc. problems. Accordingly, in order to meet the extensive need of many cities for openness to growing population, this paper aims to investigate the relationship between infill development indicators and life quality in urban neighborhoods, using descriptive-analytical research method. Findings show that infill development indicators in three physical, social and economic categories can be adapted with quality components of urban environments, especially urban neighborhoods, and related guidelines can be offered.

Keywords: infill development, life quality, urban neighborhoods, indicator

Procedia PDF Downloads 339
519 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 278
518 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 90
517 Blockchain Based Hydrogen Market (BBH₂): A Paradigm-Shifting Innovative Solution for Climate-Friendly and Sustainable Structural Change

Authors: Volker Wannack

Abstract:

Regional, national, and international strategies focusing on hydrogen (H₂) and blockchain are driving significant advancements in hydrogen and blockchain technology worldwide. These strategies lay the foundation for the groundbreaking "Blockchain Based Hydrogen Market (BBH₂)" project. The primary goal of this project is to develop a functional Blockchain Minimum Viable Product (B-MVP) for the hydrogen market. The B-MVP will leverage blockchain as an enabling technology with a common database and platform, facilitating secure and automated transactions through smart contracts. This innovation will revolutionize logistics, trading, and transactions within the hydrogen market. The B-MVP has transformative potential across various sectors. It benefits renewable energy producers, surplus energy-based hydrogen producers, hydrogen transport and distribution grid operators, and hydrogen consumers. By implementing standardized, automated, and tamper-proof processes, the B-MVP enhances cost efficiency and enables transparent and traceable transactions. Its key objective is to establish the verifiable integrity of climate-friendly "green" hydrogen by tracing its supply chain from renewable energy producers to end users. This emphasis on transparency and accountability promotes economic, ecological, and social sustainability while fostering a secure and transparent market environment. A notable feature of the B-MVP is its cross-border operability, eliminating the need for country-specific data storage and expanding its global applicability. This flexibility not only broadens its reach but also creates opportunities for long-term job creation through the establishment of a dedicated blockchain operating company. By attracting skilled workers and supporting their training, the B-MVP strengthens the workforce in the growing hydrogen sector. Moreover, it drives the emergence of innovative business models that attract additional company establishments and startups and contributes to long-term job creation. For instance, data evaluation can be utilized to develop customized tariffs and provide demand-oriented network capacities to producers and network operators, benefitting redistributors and end customers with tamper-proof pricing options. The B-MVP not only brings technological and economic advancements but also enhances the visibility of national and international standard-setting efforts. Regions implementing the B-MVP become pioneers in climate-friendly, sustainable, and forward-thinking practices, generating interest beyond their geographic boundaries. Additionally, the B-MVP serves as a catalyst for research and development, facilitating knowledge transfer between universities and companies. This collaborative environment fosters scientific progress, aligns with strategic innovation management, and cultivates an innovation culture within the hydrogen market. Through the integration of blockchain and hydrogen technologies, the B-MVP promotes holistic innovation and contributes to a sustainable future in the hydrogen industry. The implementation process involves evaluating and mapping suitable blockchain technology and architecture, developing and implementing the blockchain, smart contracts, and depositing certificates of origin. It also includes creating interfaces to existing systems such as nomination, portfolio management, trading, and billing systems, testing the scalability of the B-MVP to other markets and user groups, developing data formats for process-relevant data exchange, and conducting field studies to validate the B-MVP. BBH₂ is part of the "Technology Offensive Hydrogen" funding call within the research funding of the Federal Ministry of Economics and Climate Protection in the 7th Energy Research Programme of the Federal Government.

Keywords: hydrogen, blockchain, sustainability, innovation, structural change

Procedia PDF Downloads 148
516 An Analytical Approach for Medication Protocol Errors from Pediatric Nurse Curriculum

Authors: Priyanka Jani

Abstract:

The main focus of this research is to consider the objective of nursing curriculum in concern with pediatric nurses in respect to various parameters such as causes, reporting and prevention of medication protocol errors. A design or method selected for the study is the descriptive and cross sectional with respect to analytical study. Nurses were selected from inpatient pediatric wards of 5 hospitals in Gujarat, as a population. 126 pediatric nurses gave approval to participate in the research and completed with quarter questionnaires. The actual data was collected and analyzed. The actual data was collected and analyzed. The medium age of the nurses was 25.7 ± 3.68 years; the maximum was lady (97.6%) pediatric nurses stated that the most common causes of medication protocol errors were large work time (69.2%) and a huge ratio of patient: nurse (59.9%). Even though the highest number of nurses (89%) made use of a medication protocol errors notification system, or else they use to check it before. Many errors were not reported and nurses cited abeyant claims of nurses in case of adverse and opposite output for patient (53.97%), distrust (52.45%), and fear of various/different protocol for mediations (42%) among the causes of insufficient of notification in concern to ignorance, nurses most commonly noted the requirement for efficient data concerning the safe use of medications (47.5%). This is the frequent study made by researcher in Gujarat about the pediatric nurse curriculum regarding medication protocol errors. The outputs debate that there is a requirement for ongoing coaching of pediatric nurses regarding safe & secure medication observation and that the causes and post reporting of medication protocol errors by hand further survey.

Keywords: pediatric, medication, protocol, errors

Procedia PDF Downloads 282
515 Carbon Capture and Storage in Geological Formation, its Legal, Regulatory Imperatives and Opportunities in India

Authors: Kalbende Krunal Ramesh

Abstract:

The Carbon Capture and Storage Technology (CCS) provides a veritable platform to bridge the gap between the seemingly irreconcilable twin global challenges of ensuring a secure, reliable and diversified energy supply and mitigating climate change by reducing atmospheric emissions of carbon dioxide. Making its proper regulatory policy and making it flexible for the government and private company by law to regulate, also exploring the opportunity in this sector is the main aim of this paper. India's total annual emissions was 1725 Mt CO2 in 2011, which comprises of 6% of total global emission. It is very important to control the greenhouse gas emission for the environment protection. This paper discusses the various regulatory policy and technology adopted by some of the countries for successful using CCS technology. The brief geology of sedimentary basins in India is studied, ranging from the category I to category IV and deep water and potential for mature technology in CCS is reviewed. Areas not suitable for CO2 storage using presently mature technologies were over viewed. CSS and Clean development mechanism was developed for India, considering the various aspects from research and development, project appraisal, approval and validation, implementation, monitoring and verification, carbon credit issued, cap and trade system and its storage potential. The opportunities in oil and gas operations, power sector, transport sector is discussed briefly.

Keywords: carbon credit issued, cap and trade system, carbon capture and storage technology, greenhouse gas

Procedia PDF Downloads 419
514 Confirmatory Factor Analysis of Smartphone Addiction Inventory (SPAI) in the Yemeni Environment

Authors: Mohammed Al-Khadher

Abstract:

Currently, we are witnessing rapid advancements in the field of information and communications technology, forcing us, as psychologists, to combat the psychological and social effects of such developments. It also drives us to continually look for the development and preparation of measurement tools compatible with the changes brought about by the digital revolution. In this context, the current study aimed to identify the factor analysis of the Smartphone Addiction Inventory (SPAI) in the Republic of Yemen. The sample consisted of (1920) university students (1136 males and 784 females) who answered the inventory, and the data was analyzed using the statistical software (AMOS V25). The factor analysis results showed a goodness-of-fit of the data five-factor model with excellent indicators, as RMSEA-(.052), CFI-(.910), GFI-(.931), AGFI-(.915), TLI-(.897), NFI-(.895), RFI-(.880), and RMR-(.032). All within the ideal range to prove the model's fit of the scale’s factor analysis. The confirmatory factor analysis results showed factor loading in (4) items on (Time Spent), (4) items on (Compulsivity), (8) items on (Daily Life Interference), (5) items on (Craving), and (3) items on (Sleep interference); and all standard values of factor loading were statistically significant at the significance level (>.001).

Keywords: smartphone addiction inventory (SPAI), confirmatory factor analysis (CFA), yemeni students, people at risk of smartphone addiction

Procedia PDF Downloads 69
513 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 281
512 Analyzing e-Leadership Literature in Applying an e-Leadership Model for Community College Leaders of Hybrid Remote Teams

Authors: Lori Timmis

Abstract:

The COVID-19 pandemic precipitated significant organizational change in employee turnover, retirements, and burnout exacerbated by enrollment declines in higher education, especially community colleges. To counter this downturn, community college leaders must thoughtfully examine meaningful work opportunities to retain an engaged and productive workforce. Higher education led fully remote teams during the pandemic, which highlighted the benefits and weaknesses of building and leading remote teams. Hybrid remote teams offer possibility to reimagine community college structures, though leading remote teams requires specific e-leadership competencies. This paper examines the literature of studies on e-leadership conducted during the pandemic and from several higher education studies, pre-pandemic, against an e-leadership competency framework. The e-leadership studies conducted pre-pandemic and from the pandemic complement the e-leadership competency framework, comprising six e-leadership competencies performed via information technology communications, which provides community college (and higher education) leaders to consider hybrid remote team structures and the necessary leadership skills to lead hybrid remote teams.

Keywords: community college, e-leadership, great resignation, hybrid remote teams

Procedia PDF Downloads 83
511 Current Challenges Associated with Women Education in Pakistan and the Proposed Solutions

Authors: Sanam Mujahid, Aliza Ahmad

Abstract:

Women education and empowerment has fundamental importance in the development of a civilized society however, in a developing country like Pakistan, there are serious challenges in this regard. Herein, we summarize the findings of 2012 study which revealed the key problems associated with women education and their proposed solutions. A survey tool was used to question female students and female faculty members in 20 different public sector universities of all four provinces of Pakistan. In this study, 1755 female students and 410 female faculty members responded. In addition to survey, semi-structured interview were also conducted with 25 female students and 10 female faculty members. Respondents of the survey emphasize the lack of adequate educational institutions in nearby vicinity, social exclusion including gender discrimination, shortage of female teachers, lack of resources and inefficient government policies are the major factors that influence female education. To solve these problems, the main recommendations by respondents include safe and secure learning environment for females in educational institutions, community and parental support, well qualified and sufficient number of female teachers. One of the most important proposals was the participation of females at policy level. Current study will provide a general layout to design the future educational strategies for promoting women education in all regions of Pakistan thus, developing towards modern educated society.

Keywords: women education, education strategies, developing countries, Pakistan

Procedia PDF Downloads 383
510 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 641
509 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 77
508 Child Maltreatment Prevention Readiness Assessment in the Kingdom of Saudi Arabia

Authors: Majid Al-Eissa, Hassan Saleheen, Fatimah Al Shehri, Maha AlMuneef

Abstract:

Global efforts are being made to combat child maltreatment (CM); however, in 2011 the Kingdom of Saudi Arabia’s (KSA) response to this issue was found to be mediocre. Several developments have been implemented in KSA since then, and reevaluation is now necessary. The aim of this study is to assess the CM-prevention readiness (CMPR) of KSA in regard to implementing large-scale, evidence-based CM-prevention programs. Participants were decision makers and senior managers in the field of CM. Face-to-face interviews were conducted in the participants’ offices. This was a cross-sectional study. We used the multi-dimensional tool “Readiness Assessment for the Prevention of Child Maltreatment - short version,” which examines ten dimensions concerning this topic. Comparison between the results of this study and those of the 2011 examination was performed to determine how the situation in KSA has changed. Sixty informants were interviewed; the majority being females (57%) and from governmental institutions (56%). The average total score for the ten dimensions was 47.4%, an increase from the 43.7% reported in 2011. The strongest dimensions were legislations and mandates (8.3/10), followed by knowledge (7.1/10) and institutional links and resources (5.8/10). The lowest scores concerned human and technical resources (1.7/10) and attitude towards CM (2.8/10). Compared to the 2011 results, some dimensions showed significant improvements, but the majority had remained consistent. Time and commitment are necessary to secure CMPR improvement. Periodic assessment of CMPR is required to provide proper recommendations to the government regarding the progress of CM-prevention strategies.

Keywords: assessment, child maltreatment, prevention, readiness, Saudi Arabia

Procedia PDF Downloads 163
507 Geographies of Blackness: An Exploration of the Subaltern Public Spheres of the African Diaspora in European Cities

Authors: Teju N. Adisa-Farrar

Abstract:

In European cities, social, political and cultural geographies of blackness exist. Organizations create spaces to discuss, express, and expose the realities of young people of African descent creating an Afropean lifestyle with transnational affiliations. Focusing on black and brown spaces produced by and for the young people of African descent in Vienna and Brussels, it became clear a multidisciplinary approach would be necessary. Using Cultural Studies frameworks along with Communications Theories on Black Public Spheres and Social-Geography, a basis was created for exploring the creative, political, and economic responses of young people who are apart of the historically (and contemporary) oppressed and excluded groups of the African Diaspora. Through this intrinsic study, it became apparent that spaces created and reclaimed by young people of the African Diaspora were more inclusive and democratic than other spaces. The organizations studied have used city life as the platform to express their struggles and celebrations of their multicultural identity; clearly using historical, global black and Pan-African movements as the basis for local adaptation of an African Diaspora identity.

Keywords: African diaspora, black public sphere, identity, spaces, geographies

Procedia PDF Downloads 269
506 Glocalization of Journalism and Mass Communication Education: Best Practices from an International Collaboration on Curriculum Development

Authors: Bellarmine Ezumah, Michael Mawa

Abstract:

Glocalization is often defined as the practice of conducting business according to both local and global considerations – this epitomizes the curriculum co-development collaboration between a journalism and mass communications professor from a university in the United States and the Uganda Martyrs University in Uganda where a brand new journalism and mass communications program was recently co-developed. This paper presents the experiences and research result of this initiative which was funded through the Institute of International Education (IIE) under the umbrella of the Carnegie African Diaspora Fellowship Program (CADFP). Vital international and national concerns were addressed. On a global level, scholars have questioned and criticized the general Western-module ingrained in journalism and mass communication curriculum and proposed a decolonization of journalism curricula. Another major criticism is the concept of western-based educators transplanting their curriculum verbatim to other regions of the world without paying greater attention to the local needs. To address these two global concerns, an extensive assessment of local needs was conducted prior to the conceptualization of the new program. The assessment of needs adopted a participatory action model and captured the knowledge and narratives of both internal and external stakeholders. This involved review of pertinent documents including the nation’s constitution, governmental briefs, and promulgations, interviews with governmental officials, media and journalism educators, media practitioners, students, and benchmarking the curriculum of other tertiary institutions in the nation. Information gathered through this process served as blueprint and frame of reference for all design decisions. In the area of local needs, four key factors were addressed. First, the realization that most media personnel in Uganda are both academically and professionally unqualified. Second, the practitioners with academic training were found lacking in experience. Third, the current curricula offered at several tertiary institutions are not comprehensive and lack local relevance. The project addressed these problems thus: first, the program was designed to cater to both traditional and non-traditional students offering opportunities for unqualified media practitioners to get their formal training through evening and weekender programs. Secondly, the challenge of inexperienced graduates was mitigated by designing the program to adopt the experiential learning approach which many refer to as the ‘Teaching Hospital Model’. This entails integrating practice to theory - similar to the way medical students engage in hands-on practice under the supervision of a mentor. The university drew a Memorandum of Understanding (MoU) with reputable media houses for students and faculty to use their studios for hands-on experience and for seasoned media practitioners to guest-teach some courses. With the convergence functions of media industry today, graduates should be trained to have adequate knowledge of other disciplines; therefore, the curriculum integrated cognate courses that would render graduates versatile. Ultimately, this research serves as a template for African colleges and universities to follow in their quest to glocalize their curricula. While the general concept of journalism may remain western, journalism curriculum developers in Africa through extensive assessment of needs, and focusing on those needs and other societal particularities, can adjust the western module to fit their local needs.

Keywords: curriculum co-development, glocalization of journalism education, international journalism, needs assessment

Procedia PDF Downloads 116
505 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 131
504 Empirical Prediction of the Effect of Rain Drops on Dbs System Operating in Ku-Band (Case Study of Abuja)

Authors: Tonga Agadi Danladi, Ajao Wasiu Bamidele, Terdue Dyeko

Abstract:

Recent advancement in microwave communications technologies especially in telecommunications and broadcasting have resulted in congestion on the frequencies below 10GHz. This has forced microwave designers to look for high frequencies. Unfortunately for frequencies greater than 10GHz rain becomes one of the main factors of attenuation in signal strength. At frequencies from 10GHz upwards, rain drop sizes leads to outages that compromises the availability and quality of service this making it a critical factor in satellite link budget design. Rain rate and rain attenuation predictions are vital steps to be considered when designing microwave satellite communication link operating at Ku-band frequencies (112-18GHz). Unreliable rain rates data in the tropical regions of the world like Nigeria from radio communication group of the international Telecommunication Union (ITU-R) makes it difficult for microwave engineers to determine a realistic rain margin that needs to be accommodated in satellite link budget design in such region. This work presents an empirical tool for predicting the amount of signal due to rain on DBS signal operating at the Ku-band.

Keywords: attenuation, Ku-Band, microwave communication, rain rates

Procedia PDF Downloads 463
503 Management and Evaluation of Developing Medical Device Software in Compliance with Rules

Authors: Arash Sepehri bonab

Abstract:

One of the regions of critical development in medical devices has been the part of the software - as an indispensable component of a therapeutic device, as a standalone device, and more as of late, as applications on portable gadgets. The chance related to a breakdown of the standalone computer program utilized inside healthcare is in itself not a model for its capability or not as a medical device. It is, subsequently, fundamental to clarify a few criteria for the capability of a stand-alone computer program as a medical device. The number of computer program items and therapeutic apps is persistently expanding and so as well is used in wellbeing education (e. g., in clinics and doctors' surgeries) for determination and treatment. Within the last decade, the use of information innovation in healthcare has taken a developing part. In reality, the appropriation of an expanding number of computer devices has driven several benefits related to the method of quiet care and permitted simpler get to social and health care assets. At the same time, this drift gave rise to modern challenges related to the usage of these modern innovations. The program utilized in healthcare can be classified as therapeutic gadgets depending on the way they are utilized and on their useful characteristics. In the event that they are classified as therapeutic gadgets, they must fulfill particular directions. The point of this work is to show a computer program improvement system that can permit the generation of secure and tall, quality restorative gadget computer programs and to highlight the correspondence between each program advancement stage and the fitting standard and/or regulation.

Keywords: medical devices, regulation, software, development, healthcare

Procedia PDF Downloads 91
502 The Readiness of English Communication Skills for Travel Agents to Enter the ASEAN Economic Community

Authors: Bavornluck Kuosuwan

Abstract:

The purpose of this research was to study the level of readiness of English communication skills for travel agents in the Silom road area of Bangkok in order to enter the ASEAN economic community in the year 2015. The multi-stage sampling method was utilized with 474 respondents from 79 travel agencies. An English Questionnaire was used to collect the data. Descriptive statistics included percentage, average, standard deviation and Pearson’s r coefficient. The findings revealed that the majority of respondents were not well prepared in terms of ASEAN knowledge including laws and regulations. The majority of respondents had not been well informed about the changes that will come with the coming of ASEAN economic community. Moreover, the level of English communication for most travel agents was between the poor and intermediate level and therefore improvement is needed, especially the speaking and listening skill. In other words, the majority of respondents needed more training in terms of communications skills. The correlation between the working environment and attitude of the staff was very positive. Moreover, the correlation between the background of staff and attitude of staff was also very positive and most of demographic factors had a positive correlation with attitude of staff, except gender.

Keywords: ASEAN, communication skills, travel agents, media engineering

Procedia PDF Downloads 238
501 Analyses for Primary Coolant Pump Coastdown Phenomena for Jordan Research and Training Reactor

Authors: Yazan M. Alatrash, Han-ok Kang, Hyun-gi Yoon, Shen Zhang, Juhyeon Yoon

Abstract:

Flow coastdown phenomena are very important to secure nuclear fuel integrity during loss of off-site power accidents. In this study, primary coolant flow coastdown phenomena are investigated for the Jordan Research and Training Reactor (JRTR) using a simulation software package, Modular Modelling System (MMS). Two MMS models are built. The first one is a simple model to investigate the characteristics of the primary coolant pump only. The second one is a model for a simulation of the Primary Coolant System (PCS) loop, in which all the detailed design data of the JRTR PCS system are modelled, including the geometrical arrangement data. The same design data for a PCS pump are used for both models. Coastdown curves obtained from the two models are compared to study the PCS loop coolant inertia effect on a flow coastdown. Results showed that the loop coolant inertia effect is found to be small in the JRTR PCS loop, i.e., about one second increases in a coastdown half time required to halve the coolant flow rate. The effects of different flywheel inertia on the flow coastdown are also investigated. It is demonstrated that the coastdown half time increases with the flywheel inertia linearly. The designed coastdown half time is proved to be well above the design requirement for the fuel integrity.

Keywords: flow coastdown, loop inertia, modelling, research reactor

Procedia PDF Downloads 479