Search results for: OSSIM (Open Source Security Information Management tool)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28374

Search results for: OSSIM (Open Source Security Information Management tool)

27624 A Design Framework for an Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking

Authors: Trevor Toy, Josef Langerman

Abstract:

Around a quarter of the world’s data is generated by financial with an estimated 708.5 billion global non-cash transactions reached between 2018 and. And with Open Banking still a rapidly developing concept within the financial industry, there is an opportunity to create a secure mechanism for connecting its stakeholders to openly, legitimately and consensually share the data required to enable it. Integration and data sharing of anonymised transactional data are still operated in silos and centralised between the large corporate entities in the ecosystem that have the resources to do so. Smaller fintechs generating data and businesses looking to consume data are largely excluded from the process. Therefore there is a growing demand for accessible transactional data for analytical purposes and also to support the rapid global adoption of Open Banking. The following research has provided a solution framework that aims to provide a secure decentralised marketplace for 1.) data providers to list their transactional data, 2.) data consumers to find and access that data, and 3.) data subjects (the individuals making the transactions that generate the data) to manage and sell the data that relates to themselves. The platform also provides an integrated system for downstream transactional-related data from merchants, enriching the data product available to build a comprehensive view of a data subject’s spending habits. A robust and sustainable data market can be developed by providing a more accessible mechanism for data producers to monetise their data investments and encouraging data subjects to share their data through the same financial incentives. At the centre of the platform is the market mechanism that connects the data providers and their data subjects to the data consumers. This core component of the platform is developed on a decentralised blockchain contract with a market layer that manages transaction, user, pricing, payment, tagging, contract, control, and lineage features that pertain to the user interactions on the platform. One of the platform’s key features is enabling the participation and management of personal data by the individuals from whom the data is being generated. This framework developed a proof-of-concept on the Etheruem blockchain base where an individual can securely manage access to their own personal data and that individual’s identifiable relationship to the card-based transaction data provided by financial institutions. This gives data consumers access to a complete view of transactional spending behaviour in correlation to key demographic information. This platform solution can ultimately support the growth, prosperity, and development of economies, businesses, communities, and individuals by providing accessible and relevant transactional data for big data analytics and open banking.

Keywords: big data markets, open banking, blockchain, personal data management

Procedia PDF Downloads 73
27623 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 552
27622 Friendly Public Spaces in Iran

Authors: Bibi Somayeh Aliakbari, Niknaz Kachooei, Fatemeh Amiri Najafabadi

Abstract:

According to the results of contemporary urbanism, social living moved into buildings and the quality of urban space has been declining. But still, there are life in open public space and it is one of reason attendance and activities of people in open public spaces.The purpose of this research is finding reason creation friendly public space in urban spaces and also use these in new urban spaces.The research methodology consisted of a qualitative model based on observation and graphical analysis. In this paper case study is public space historical, moderns in urban scales and local scales in Iran.This paper shows that Existence of friendly public space in cities cause is attendance and activities of people in open public spaces that it is reason the revitalization of public open spaces in cities.

Keywords: public space, public open space, friendly public space, Iran

Procedia PDF Downloads 581
27621 Determining Factors for Opening Accounts, Customers’ Perception and Their Satisfaction Level Towards the First Security Islamic Bank of Bangladesh

Authors: Md. Akiz Uddin

Abstract:

This research attempted to identify the determining factors that extensively persuaded customers of the First Security Islamic Bank Limited (FSIBL) to open accounts and their perception and satisfaction level towards it. Initially, a theoretical model was established based on existing literature reviews. After that, a self-administered structured questionnaire was developed, and data were collected from 180 customers of the FSIBL of Bangladesh using purposive sampling technique. The collected data were later analyzed through a statistical software. Structural Equation Modelling (SEM) was used to verify the model of the study and test the hypotheses. The study particularly examined the determinants of opening accounts, customers’ perception and their satisfaction level towards the bank on several factors like the bank’s compliance with Shariah law, use of modern technology, assurance, reliability, empathy, profitability, and responsiveness. To examine the impact of religious belief on being FSIBL clients, the study also investigates non-Muslim clients’ perception about FSIBL. The study focused on FSIBL customers only from five branches of Dhaka city. The study found that the religious beliefs is the most significant factors for Muslim customers for considering FSIBL to open an account, and they are satisfied with the services, too. However, for non-Muslim customers, other benefits like E-banking, various user-friendly services are the most significant factors for choosing FSIBL. Their satisfaction level is also statistically significant. Furthermore, even if the non- Muslim customers didn’t consider religious beliefs as determinant factors for choosing FSIBL, the respondents informed that they have trust that people who believe in shariah law are more reliable to keep money with them. These findings open up the avenue for future researchers to conduct more study in this area through employing a larger sample size and more branches and extending the current model by incorporating new variables. The study will be an important addition to the potentials of Islamic banking system, literature of service quality and customer satisfaction level, particularly in the success of Islamic banking system in Bangladesh.

Keywords: islamic banking, customers’ satisfaction, customers’ perception, shariah law

Procedia PDF Downloads 75
27620 Human Security through Human Rights in the Contemporary World

Authors: Shilpa Bagade Poharkar

Abstract:

The basis for traditional notion of security was the use of force to preserve vital interest which based on either realism or power politics. The modern approach to security extends beyond the traditional notions of security which focus on issues as development and respect for human rights. In global politics, the issue of human security plays a vital role in most of the policy matter. In modern era, the protection of human rights is now recognized as one of the main functions of any legitimate modern state. The research paper will explore the relationship between human rights and security. United Nations is facing major challenges like rampant poverty, refugee outflows, human trafficking, displacement, conflicts, terrorism, intra-inter ethnic conflicts, proliferation of small arms, genocide, piracy, climate change, health issues and so on. The methodology is observed in this paper is doctrinaire which includes analytical and descriptive comparative method. The hypothesis of the paper is the relationship between human rights and a goal of United Nations to attain peace and security. Although previous research has been done in this field but this research paper will try to find out the challenges in the human security through human rights in the contemporary world and will provide measures for it. The study will focus on the following research questions: What are the issues and challenges United Nations facing while advancing human security through human rights? What measures the international community would take for ensuring the protection of human rights while protecting state security and contribute in the attainment of goals of United Nations?

Keywords: human rights, human security, peace, security, United Nations

Procedia PDF Downloads 245
27619 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.

Keywords: discrete wavelet transforms, AES, dynamic SBox

Procedia PDF Downloads 430
27618 Design and Development of Data Mining Application for Medical Centers in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: data mining, medical record system, systems programming, computing

Procedia PDF Downloads 207
27617 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 114
27616 Enhancing Quality Management Systems through Automated Controls and Neural Networks

Authors: Shara Toibayeva, Irbulat Utepbergenov, Lyazzat Issabekova, Aidana Bodesova

Abstract:

The article discusses the importance of quality assessment as a strategic tool in business and emphasizes the significance of the effectiveness of quality management systems (QMS) for enterprises. The evaluation of these systems takes into account the specificity of quality indicators, the multilevel nature of the system, and the need for optimal selection of the number of indicators and evaluation of the system state, which is critical for making rational management decisions. Methods and models of automated enterprise quality management are proposed, including an intelligent automated quality management system integrated with the Management Information and Control System. These systems make it possible to automate the implementation and support of QMS, increasing the validity, efficiency, and effectiveness of management decisions by automating the functions performed by decision makers and personnel. The paper also emphasizes the use of recurrent neural networks to improve automated quality management. Recurrent neural networks (RNNs) are used to analyze and process sequences of data, which is particularly useful in the context of document quality assessment and non-conformance detection in quality management systems. These networks are able to account for temporal dependencies and complex relationships between different data elements, which improves the accuracy and efficiency of automated decisions. The project was supported by a grant from the Ministry of Education and Science of the Republic of Kazakhstan under the Zhas Galym project No. AR 13268939, dedicated to research and development of digital technologies to ensure consistency of QMS regulatory documents.

Keywords: automated control system, quality management, document structure, formal language

Procedia PDF Downloads 38
27615 Geographic Information System for Simulating Air Traffic By Applying Different Multi-Radar Positioning Techniques

Authors: Amara Rafik, Mostefa Belhadj Aissa

Abstract:

Radar data is one of the many data sources used by ATM Air Traffic Management systems. These data come from air navigation radar antennas. These radars intercept signals emitted by the various aircraft crossing the controlled airspace and calculate the position of these aircraft and retransmit their positions to the Air Traffic Management System. For greater reliability, these radars are positioned in such a way as to allow their coverage areas to overlap. An aircraft will therefore be detected by at least one of these radars. However, the position coordinates of the same aircraft and sent by these different radars are not necessarily identical. Therefore, the ATM system must calculate a single position (radar track) which will ultimately be sent to the control position and displayed on the air traffic controller's monitor. There are several techniques for calculating the radar track. Furthermore, the geographical nature of the problem requires the use of a Geographic Information System (GIS), i.e. a geographical database on the one hand and geographical processing. The objective of this work is to propose a GIS for traffic simulation which reconstructs the evolution over time of aircraft positions from a multi-source radar data set and by applying these different techniques.

Keywords: ATM, GIS, radar data, simulation

Procedia PDF Downloads 115
27614 Improving the Logistic System to Secure Effective Food Fish Supply Chain in Indonesia

Authors: Atikah Nurhayati, Asep A. Handaka

Abstract:

Indonesia is a world’s major fish producer which can feed not only its citizens but also the people of the world. Currently, the total annual production is 11 tons and expected to double by the year of 2050. Given the potential, fishery has been an important part of the national food security system in Indonesia. Despite such a potential, a big challenge is facing the Indonesians in making fish the reliable source for their food, more specifically source of protein intake. The long geographic distance between the fish production centers and the consumer concentrations has prevented effective supply chain from producers to consumers and therefore demands a good logistic system. This paper is based on our research, which aimed at analyzing the fish supply chain and is to suggest relevant improvement to the chain. The research was conducted in the Year of 2016 in selected locations of Java Island, where intensive transaction on fishery commodities occur. Data used in this research comprises secondary data of time series reports on production and distribution and primary data regarding distribution aspects which were collected through interviews with purposively selected 100 respondents representing fishers, traders and processors. The data were analyzed following the supply chain management framework and processed following logistic regression and validity tests. The main findings of the research are as follows. Firstly, it was found that improperly managed connectivity and logistic chain is the main cause for insecurity of availability and affordability for the consumers. Secondly, lack of quality of most local processed products is a major obstacle for improving affordability and connectivity. The paper concluded with a number of recommended strategies to tackle the problem. These include rationalization of the length of the existing supply chain, intensification of processing activities, and improvement of distribution infrastructure and facilities.

Keywords: fishery, food security, logistic, supply chain

Procedia PDF Downloads 239
27613 Lessons Learnt from Tutors’ Perspectives on Online Tutorial’s Policies in Open and Distance Education Institution

Authors: Durri Andriani, Irsan Tahar, Lilian Sarah Hiariey

Abstract:

Every institution has to develop, implement, and control its policies to ensure the effectiveness of the institution. In doing so, all related stakeholders have to be involved to maximize the benefit of the policies and minimize the potential constraints and resistances. Open and distance education (ODE) institution is no different. As an education institution, ODE institution has to focus their attention to fulfilling academic needs of their students through open and distance measures. One of them is quality learning support system. Significant stakeholders in learning support system are tutors since they are the ones who directly communicate with students. Tutors are commonly seen as objects whose main responsibility is limited to implementing policies decided by management in ODE institutions. Nonetheless, tutors’ perceptions of tutorials are believed to influence tutors’ performances in facilitating learning support. It is therefore important to analyze tutors’ perception on various aspects of learning support. This paper presents analysis of tutors’ perceptions on policies of tutoriala in ODE institution using Policy Analysis Framework (PAF) modified by King, Nugent, Russell, and Lacy. Focus of this paper is on on-line tutors, those who provide tutorials via Internet. On-line tutors were chosen to stress the increasingly important used of Internet in ODE system. The research was conducted in Universitas Terbuka (UT), Indonesia. UT is purposely selected because of its large number (1,234) of courses offered and large area coverage (6000 inhabited islands). These posed UT in a unique position where learning support system has, to some extent, to be standardized while at the same time it has to be able to cater the needs of different courses in different places for students with different backgrounds. All 598 listed on-line tutors were sent the research questionnaires. Around 20% of the email addresses could not be reached. Tutors were asked to fill out open-ended questionnaires on their perceptions on definition of on-line tutorial, roles of tutors and students in on-line tutorials, requirement for on-line tutors, learning materials, and student evaluation in on-line tutorial. Data analyzed was gathered from 40 on-line tutors who sent back filled-out questionnaires. Data were analyzed qualitatively using content analysis from all 40 tutors. The results showed that using PAF as entry point in choosing learning support services as area of policy with delivery learning materials as the issue at UT has been able to provide new insights of aspects need to be consider in formulating policies in online tutorial and in learning support services. Involving tutors as source of information could be proven to be productive. In general, tutors had clear understanding about definition of online tutorial, roles of tutors and roles of students, and requirement of tutor. Tutors just need to be more involved in the policy formulation since they could provide data on students and problem faced in online tutorial. However, tutors need an adjustment in student evaluation which according tutors too focus on administrative aspects and subjective.

Keywords: distance education, on-line tutorial, tutorial policy, tutors’ perspectives

Procedia PDF Downloads 252
27612 A Numerical Study on the Effects of N2 Dilution on the Flame Structure and Temperature Distribution of Swirl Diffusion Flames

Authors: Yasaman Tohidi, Shidvash Vakilipour, Saeed Ebadi Tavallaee, Shahin Vakilipoor Takaloo, Hossein Amiri

Abstract:

The numerical modeling is performed to study the effects of N2 addition to the fuel stream on the flame structure and temperature distribution of methane-air swirl diffusion flames with different swirl intensities. The Open source Field Operation and Manipulation (OpenFOAM) has been utilized as the computational tool. Flamelet approach along with modified k-ε model is employed to model the flame characteristics.  The results indicate that the presence of N2 in the fuel stream leads to the flame temperature reduction. By increasing of swirl intensity, the flame structure changes significantly. The flame has a conical shape in low swirl intensity; however, it has an hour glass-shape with a shorter length in high swirl intensity. The effects of N2 dilution decrease the flame length in all swirl intensities; however, the rate of reduction is more noticeable in low swirl intensity.

Keywords: swirl diffusion flame, N2 dilution, OpenFOAM, swirl intensity

Procedia PDF Downloads 167
27611 Study of Eatable Aquatic Invertebrates in the River Dhansiri, Dimapur, Nagaland, India

Authors: Dilip Nath

Abstract:

A study has been conducted on the available aquatic invertebrates in the river Dhansiri at Dimapur site. The study confirmed that the river body composed of aquatic macroinvertebrate community under two phyla viz., Arthropods and Molluscs. Total 10 species have been identified from there as the source of alternative protein food for the common people. Not only the protein source, they are also the component of aquatic food chain and indicators of aquatic ecosystem. Proper management and strategies to promote the edible invertebrates can be considered as the alternative protein and alternative income source for the common people for sustainable livelihood improvement.

Keywords: Dhansiri, Dimapur, invertebrates, livelihood improvement, protein

Procedia PDF Downloads 150
27610 Virtual Team Management in Companies and Organizations

Authors: Asghar Zamani, Mostafa Falahmorad

Abstract:

Virtualization is established to combine and use the unique capabilities of employees to increase productivity and agility to provide services regardless of location. Adapting to fast and continuous change and getting maximum access to human resources are reasons why virtualization is happening. The distance problem is solved by information. Flexibility is the most important feature of virtualization, and information will be the main focus of virtualized companies. In this research, we used the Covid-19 opportunity window to assess the productivity of the companies that had been going through more virtualized management before the Covid-19 in comparison with those that just started planning on developing infrastructures on virtual management after the crises of pandemic occurred. The research process includes financial (profitability and customer satisfaction) and behavioral (organizational culture and reluctance to change) metrics assessment. In addition to financial and CRM KPIs, a questionnaire is devised to assess how manager and employees’ attitude has been changing towards the migration to virtualization. The sample companies and questions are selected by asking from experts in the IT industry of Iran. In this article, the conclusion is that companies open to virtualization based on accurate strategic planning or willing to pay to train their employees for virtualization before the pandemic are more agile in adapting to change and moving forward in recession. The prospective companies in this research, not only could compensate for the short period loss from the first shock of the Covid-19, but they could also foresee new needs of their customer sooner than other competitors, resulting in the need to employ new staff for executing the emerging demands. Findings were aligned with the literature review. Results can be a wake-up call for business owners especially in developing countries to be more resilient toward modern management styles instead of continuing with traditional ones.

Keywords: virtual management, virtual organization, competitive advantage, KPI, profit

Procedia PDF Downloads 82
27609 Computational Fluid Dynamics Simulations and Analysis of Air Bubble Rising in a Column of Liquid

Authors: Baha-Aldeen S. Algmati, Ahmed R. Ballil

Abstract:

Multiphase flows occur widely in many engineering and industrial processes as well as in the environment we live in. In particular, bubbly flows are considered to be crucial phenomena in fluid flow applications and can be studied and analyzed experimentally, analytically, and computationally. In the present paper, the dynamic motion of an air bubble rising within a column of liquid is numerically simulated using an open-source CFD modeling tool 'OpenFOAM'. An interface tracking numerical algorithm called MULES algorithm, which is built-in OpenFOAM, is chosen to solve an appropriate mathematical model based on the volume of fluid (VOF) numerical method. The bubbles initially have a spherical shape and starting from rest in the stagnant column of liquid. The algorithm is initially verified against numerical results and is also validated against available experimental data. The comparison revealed that this algorithm provides results that are in a very good agreement with the 2D numerical data of other CFD codes. Also, the results of the bubble shape and terminal velocity obtained from the 3D numerical simulation showed a very good qualitative and quantitative agreement with the experimental data. The simulated rising bubbles yield a very small percentage of error in the bubble terminal velocity compared with the experimental data. The obtained results prove the capability of OpenFOAM as a powerful tool to predict the behavior of rising characteristics of the spherical bubbles in the stagnant column of liquid. This will pave the way for a deeper understanding of the phenomenon of the rise of bubbles in liquids.

Keywords: CFD simulations, multiphase flows, OpenFOAM, rise of bubble, volume of fluid method, VOF

Procedia PDF Downloads 122
27608 Inclusive Business and Its Contribution to Farmers Wellbeing in Arsi Ethiopia: Empirical Evidence

Authors: Senait G. Worku, Ellen Mangnus

Abstract:

Inclusive business models which integrates low-income people with companies value chain in a commercially viable way has gained momentum for the perceived potential to contribute to poverty alleviation and food security in developing countries. This article investigates the impact of Community Revenue Enhancement through Technology Extension (CREATE) project of Heineken brewery on smallholder farmers’ wellbeing in Arsi zone Oromia regional state of Ethiopia. CREATE is a Public-Private Partnership (PPP) between Ministry of Foreign Affairs of the Netherlands and Heineken N.V. which source malt barely from smallholder farmers in three zones of Oromia. The study assessed the impact of CREATE on malt barley productivity, food security and new asset purchase in Arsi zone by comparing households that participate in the project with non-participating households using propensity score matching method. The finding indicated that households that participated in the CREATE project had higher malt barley productivity and purchased more new assets than non-participating households. However, there is no significant difference on food security status of participating and non-participating households indicating that the project has a profound impact on asset accumulation than on food security improvement.

Keywords: inclusive business, malt barley, propensity score matching, wellbeing

Procedia PDF Downloads 154
27607 Georgian Social Security System Compatibility with EU Requirements

Authors: Nino Grigolaia

Abstract:

Introduction: The article discusses the experience of the EU in the social field, analyzes the peculiarities of the functioning of the social system in Georgia, and reveals the priority and importance of social policy. Methodology: Different research methods are applied in the presented paper. There are used induction, deduction, analysis, synthesis, analogy, correlation, and statistical observation methodologies in the work. Main Findings: Based on the analysis of social security reforms in Georgia, the main systematic problems are detected, the recommendations on social security system components, integration of the social security field in the unified insurance system, the formation of the national social system, perfection of the legislative, regulatory framework of social protection, adoption of foreign experience are developed in the article. Conclusion: The article concludes that the social protection system in Georgia is at an early stage of development, with the significant impact of factors such as high level of unemployment, low pensions, a large number of families living under the poverty line, and other ones. Accordingly, it is well-established that the study of the social security problem in Georgia is still actual. Based on the analysis, appropriate suggestions in the field of social security are made, and relevant recommendations are proposed.

Keywords: social security, social system, social policy, social security models

Procedia PDF Downloads 145
27606 Assessing the Feasibility of Italian Hydrogen Targets with the Open-Source Energy System Optimization Model TEMOA - Italy

Authors: Alessandro Balbo, Gianvito Colucci, Matteo Nicoli, Laura Savoldi

Abstract:

Hydrogen is expected to become a game changer in the energy transition, especially enabling sector coupling possibilities and the decarbonization of hard-to-abate end-uses. The Italian National Recovery and Resilience Plan identifies hydrogen as one of the key elements of the ecologic transition to meet international decarbonization objectives, also including it in several pilot projects for the early development in Italy. This matches the European energy strategy, which aims to make hydrogen a leading energy carrier of the future, setting ambitious goals to be accomplished by 2030. The huge efforts needed to achieve the announced targets require to carefully investigate of their feasibility in terms of economic expenditures and technical aspects. In order to quantitatively assess the hydrogen potential within the Italian context and the feasibility of the planned investments and projects, this work uses the TEMOA-Italy energy system model to study pathways to meet the strict objectives above cited. The possible hydrogen development has been studied both in the supply-side and demand-side of the energy system, also including storage options and distribution chains. The assessment comprehends alternative hydrogen production technologies involved in a competition market, reflecting the several possible investments declined by the Italian National Recovery and Resilience Plan to boost the development and spread of this infrastructure, including the sector coupling potential with natural gas through the currently existing infrastructure and CO2 capture for the production of synfuels. On the other hand, the hydrogen end-uses phase covers a wide range of consumption alternatives, from fuel-cell vehicles, for which both road and non-road transport categories are considered, to steel, and chemical industries uses and cogeneration for residential and commercial buildings. The model includes both high and low TRL technologies in order to provide a consistent outcome for the future decades as it does for the present day, and since it is developed through the use of an open-source code instance and database, transparency and accessibility are fully granted.

Keywords: decarbonization, energy system optimization models, hydrogen, open-source modeling, TEMOA

Procedia PDF Downloads 100
27605 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 363
27604 Nutriscience Project: A Web-Based Intervention to Improve Nutritional Literacy among Families and Educators of Pre-School Children

Authors: R. Barros, J. Azevedo, P. Padrão, M. Gregório, I. Pádua, C. Almeida, C. Rodrigues, P. Fontes, A. Coelho

Abstract:

Recent evidence shows a positive association between nutritional literacy and healthy eating. Traditional nutrition education strategies for childhood obesity prevention have shown weak effect. The Nutriscience project aims to create and evaluate an innovative and multidisciplinary strategy for promoting effective and accessible nutritional information to children, their families, and educators. Nutriscience is a one-year prospective follow-up evaluation study including pre-school children (3-5 y), who attend national schools’ network (29). The project is structured around a web-based intervention, using an on-line interactive platform, and focus on increasing fruit and vegetable consumption, and reducing sugar and salt intake. The platform acts as a social network where educational materials, games, and nutritional challenges are proposed in a gamification approach that promotes family and community social ties. A nutrition Massive Online Open Course is developed for educators, and a national healthy culinary contest will be promoted on TV channel. A parental self-reported questionnaire assessing sociodemographic and nutritional literacy (knowledge, attitudes, skills) is administered (baseline and end of the intervention). We expect that results on nutritional literacy from the presented strategy intervention will give us important information about the best practices for health intervention with kindergarten families. This intervention program using a digital interactive platform could be an educational tool easily adapted and disseminated for childhood obesity prevention.

Keywords: childhood obesity, educational tool, nutritional literacy, web-based intervention

Procedia PDF Downloads 333
27603 High Techno-Parks in the Economy of Azerbaijan and Their Management Problems

Authors: Rasim M. Alguliyev, Alovsat G. Aliyev, Roza O. Shahverdiyeva

Abstract:

The paper investigated the role and position of high techno-parks, which is one of the priorities of Azerbaijan. The main objectives, functions and features of the establishment of high-techno parks, as well as organization of the activity of the structural elements, which are the parking complex and their interactions were analyzed. The development, organization and management of high techno-parks were studied. The key features and functions of innovative structures’ management were explained. The need for a comprehensive management system for the development of high-techno parks was emphasized and the major problems were analyzed. In addition, the methods were proposed for the development of information systems supporting decision making in systematic and sustainable management of the parks.

Keywords: innovative development, innovation processes, innovation economy, innovation infrastructure, high technology park, efficient management, management decisions, information insurance

Procedia PDF Downloads 470
27602 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 183
27601 Effect of Open Burning on Soil Carbon Stock in Sugarcane Plantation in Thailand

Authors: Wilaiwan Sornpoon, Sébastien Bonnet, Savitri Garivait

Abstract:

Open burning of sugarcane fields is recognized to have a negative impact on soil by degrading its properties, especially soil organic carbon (SOC) content. Better understating the effect of open burning on soil carbon dynamics is crucial for documenting the carbon sequestration capacity of agricultural soils. In this study, experiments to investigate soil carbon stocks under burned and unburned sugarcane plantation systems in Thailand were conducted. The results showed that cultivation fields without open burning during 5 consecutive years enabled to increase the SOC content at a rate of 1.37 Mg ha-1y-1. Also it was found that sugarcane fields burning led to about 15% reduction of the total carbon stock in the 0-30 cm soil layer. The overall increase in SOC under unburned practice is mainly due to the large input of organic material through the use of sugarcane residues.

Keywords: soil organic carbon, soil inorganic carbon, carbon sequestration, open burning, sugarcane

Procedia PDF Downloads 304
27600 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 410
27599 Proposal for an Inspection Tool for Damaged Structures after Disasters

Authors: Karim Akkouche, Amine Nekmouche, Leyla Bouzid

Abstract:

This study focuses on the development of a multifunctional Expert System (ES) called post-seismic damage inspection tool (PSDIT), a powerful tool which allows the evaluation, the processing, and the archiving of the collected data stock after earthquakes. PSDIT can be operated by two user types; an ordinary user (ingineer, expert, or architect) for the damage visual inspection and an administrative user for updating the knowledge and / or for adding or removing the ordinary user. The knowledge acquisition is driven by a hierarchical knowledge model, the Information from investigation reports and those acquired through feedback from expert / engineer questionnaires are part.

Keywords: .disaster, damaged structures, damage assessment, expert system

Procedia PDF Downloads 80
27598 Holographic Visualisation of 3D Point Clouds in Real-time Measurements: A Proof of Concept Study

Authors: Henrique Fernandes, Sofia Catalucci, Richard Leach, Kapil Sugand

Abstract:

Background: Holograms are 3D images formed by the interference of light beams from a laser or other coherent light source. Pepper’s ghost is a form of hologram conceptualised in the 18th century. This Holographic visualisation with metrology measuring techniques by displaying measurements taken in real-time in holographic form can assist in research and education. New structural designs such as the Plexiglass Stand and the Hologram Box can optimise the holographic experience. Method: The equipment used included: (i) Zeiss’s ATOS Core 300 optical coordinate measuring instrument that scanned real-world objects; (ii) Cloud Compare, open-source software used for point cloud processing; and (iii) Hologram Box, designed and manufactured during this research to provide the blackout environment needed to display 3D point clouds in real-time measurements in holographic format, in addition to a portability aspect to holograms. The equipment was tailored to realise the goal of displaying measurements in an innovative technique and to improve on conventional methods. Three test scans were completed before doing a holographic conversion. Results: The outcome was a precise recreation of the original object in the holographic form presented with dense point clouds and surface density features in a colour map. Conclusion: This work establishes a way to visualise data in a point cloud system. To our understanding, this is a work that has never been attempted. This achievement provides an advancement in holographic visualisation. The Hologram Box could be used as a feedback tool for measurement quality control and verification in future smart factories.

Keywords: holography, 3D scans, hologram box, metrology, point cloud

Procedia PDF Downloads 88
27597 Design of the Ubiquitous Cloud Learning Management System

Authors: Panita Wannapiroon, Noppadon Phumeechanya, Sitthichai Laisema

Abstract:

This study is the research and development which is intended to: 1) design the ubiquitous cloud learning management system and: 2) assess the suitability of the design of the ubiquitous cloud learning management system. Its methods are divided into 2 phases. Phase 1 is the design of the ubiquitous cloud learning management system, phase 2 is the assessment of the suitability of the design the samples used in this study are work done by 25 professionals in the field of Ubiquitous cloud learning management systems and information and communication technology in education selected using the purposive sampling method. Data analyzed by arithmetic mean and standard deviation. The results showed that the ubiquitous cloud learning management system consists of 2 main components which are: 1) the ubiquitous cloud learning management system server (u-Cloud LMS Server) including: cloud repository, cloud information resources, social cloud network, cloud context awareness, cloud communication, cloud collaborative tools, and: 2) the mobile client. The result of the system suitability assessment from the professionals is in the highest range.

Keywords: learning management system, cloud computing, ubiquitous learning, ubiquitous learning management system

Procedia PDF Downloads 517
27596 Performance Analysis of Absorption Power Cycle under Different Source Temperatures

Authors: Kyoung Hoon Kim

Abstract:

The absorption power generation cycle based on the ammonia-water mixture has attracted much attention for efficient recovery of low-grade energy sources. In this paper, a thermodynamic performance analysis is carried out for a Kalina cycle using ammonia-water mixture as a working fluid for efficient conversion of low-temperature heat source in the form of sensible energy. The effects of the source temperature on the system performance are extensively investigated by using the thermodynamic models. The results show that the source temperature as well as the ammonia mass fraction affects greatly on the thermodynamic performance of the cycle.

Keywords: ammonia-water mixture, Kalina cycle, low-grade heat source, source temperature

Procedia PDF Downloads 456
27595 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 263