Search results for: high security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21996

Search results for: high security

21246 Essential Elements and Trace Metals on a Continuously Cultivated and Fertilised Field

Authors: Pholosho M. Kgopa, Phatu W. Mashela

Abstract:

Due to high incidents of marginal land in Limpopo Province, South Africa, and increasing demand for arable land, small-holder farmers tend to continuously cultivate the same fields and at the same time, applying fertilisers to improve yields for meeting local food security. These practices might have an impact on the distribution of trace and essential elements. Therefore, the objective of this investigation was to assess the distribution of essential elements and trace metals in a continuously cultivated and fertilised field, at the University of Limpopo Experimental Farm. Three fields, 3 ha each were identified as continuously cultivated (CC), moderately cultivated (MC) and virgin fields (VF). Each field was divided into 12 equal grids of 50 m × 50 m for sampling. A soil profile was opened in each grid, where soil samples were collected from 0-20; 20-40 and 40-60; 60-80 and 80-100 cm depths for analysis. Samples were analysed for soil texture, pH, electrical conductivity, organic matter content, selected essential elements (Ca, P and Mg), Na and trace elements (Cu, Fe, Ni, and Zn). Results suggested that most of the variables were vertically different, with high concentrations of the test elements except for magnesium. Soil pH in depth 0-20 cm was high (6.44) in CC when compared to that in VF (5.29), but lower than that of MC (7.84). There were no distinctive vertical trends of the variables, except for Mg, Na, and K which displayed a declining trend at 40-60 cm depth when compared to the 0-20 cm depth. Concentrations of Fe, Cu, Zn, and Ni were generally low which might be due to their indirect relationship with soil pH. Continuous cultivation and fertilisation altered soil chemical properties; which could explain the unproductivity of such fields.

Keywords: over-cultivation, soil chemical properties, vertical distribution, spatial distribution

Procedia PDF Downloads 183
21245 Resilient Regions for Purpose of Crisis Management

Authors: Jana Gebhartova, Tomas Duda, Ivan Benes

Abstract:

World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.

Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies

Procedia PDF Downloads 374
21244 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 76
21243 High-Production Laser and Plasma Welding Technologies for High-Speed Vessels Production

Authors: V. M. Levshakov, N. A. Steshenkova, N. A. Nosyrev

Abstract:

Application of hulls processing technologies, based on high-concentrated energy sources (laser and plasma technologies), allow improve shipbuilding production. It is typical for high-speed vessels construction using steel and aluminum alloys with high precision hulls required. Report describes high-performance technologies for plasma welding (using direct current of reversed polarity), laser, and hybrid laser-arc welding of hulls structures developed by JSC “SSTC”.

Keywords: flat sections, hybrid laser-arc welding, plasma welding, plasmatron

Procedia PDF Downloads 437
21242 Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana

Authors: Bertha Korang Gyimah, Obed Asamoah, Kenross, T. Asamoah

Abstract:

In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession.

Keywords: community, bia west, Ghana, participation, police

Procedia PDF Downloads 139
21241 Efficiency of Using E-Wallets as Payment Method in Marikina City During COVID-19 Pandemic

Authors: Noel Paolo Domingo, James Paul Menina, Laurente Ferrer

Abstract:

Most people were forced to stay at home and limit their physical contact during the COVID-19 pandemic. Due to the situation, strict implementation of government policies and safety protocols encouraged consumers to utilize cashless or digital transactions through e-wallets. In this study, the researchers aim to investigate the efficiency of using e-wallets as a payment method during the COVID-19 pandemic in Marikina City. The study examined the efficiency of e-wallets in terms of Usefulness, Convenience, and Safety and Security based on respondents’ assessment. Questionnaires developed by the researchers were distributed to a total of 400 e-wallet users in Marikina City aged 15 years old and above to gather data by using a purposive sampling technique. The data collected was processed using SPSS version 26. Frequency, percentage, and mean were utilized to describe the profile of respondents and their assessment of e-wallets in terms of the three constructs. ANOVA and t-tests were also employed to test the significant differences in the respondent’s assessment when the demographic profile was considered. The study revealed that when it comes to usefulness, e-wallet is efficient while in terms of convenience, and safety and security, e-wallet has been proven to be very efficient. During the COVID-19 pandemic, utilizing e-wallets has been embraced by most consumers. By enhancing its features, more people will be satisfied with using e-wallets.

Keywords: efficiency of e-wallets, usefulness, convenience, safety and security

Procedia PDF Downloads 129
21240 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 513
21239 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 125
21238 Flood Risk Assessment in the Niger River Basin in Support of the Conception of a Flood Risk Management Plan: Case Study of the District of Malanville, Benin

Authors: Freddy Houndekindo

Abstract:

A study was carried out to evaluate the flood risk in the district of Malanville located along the Niger River. The knowledge produce by this study is useful in the implementation of adaptation and/or mitigation measures to alleviate the impact of the flooding on the populations, the economy and the environment. Over the course of the study, the lack of data in the area of interest has been one of the main challenges encountered. Therefore, in the analysis of the flood hazard different sources of remotely sensed data were used. Moreover, the flood hazard was analysed by applying a 1D hydraulic model: HEC-RAS. After setting up the model for the study area, the different flood scenarios considered were simulated and mapped using ArcGIS and the HEC-GEORAS extension. The result of the simulation gave information about the inundated areas and the water depths at each location. From the analysis of the flood hazard, it was found that between 47% and 50% of the total area of the district of Malanville would be flooded in the different flood scenarios considered, and the water depth varies between 1 and 7 m. The townships of Malanville most at risk of flooding are Momkassa and Galiel, located in a high-risk and very high-risk zone, respectively. Furthermore, the assessment of the flood risk showed that the most vulnerable sector to the inundations is the agricultural sector. Indeed, the cultivated floodplains were the most affected areas by the floodwater in every flood scenarios. Knowing that a high proportion of the population of the district relies on their farmlands in these floodplains for their livelihood, the floods pose a challenge not only to the food security in the area but also to its development.

Keywords: flood risk management, Niger, remote sensing, vulnerability

Procedia PDF Downloads 148
21237 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria

Authors: Babatunde Oluwamayokun Soyoye

Abstract:

This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.

Keywords: design and fabrication, food security, grain crop, motorized planter

Procedia PDF Downloads 127
21236 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 284
21235 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 62
21234 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 445
21233 The Influence of Production Hygiene Training on Farming Practices Employed by Rural Small-Scale Organic Farmers - South Africa

Authors: Mdluli Fezile, Schmidt Stefan, Thamaga-Chitja Joyce

Abstract:

In view of the frequently reported foodborne disease outbreaks caused by contaminated fresh produce, consumers have a preference for foods that meet requisite hygiene standards to reduce the risk of foodborne illnesses. Producing good quality fresh produce then becomes critical in improving market access and food security, especially for small-scale farmers. Questions of hygiene and subsequent microbiological quality in the rural small-scale farming sector of South Africa are even more crucial, given the policy drive to develop small-scale farming as a measure for reinforcement of household food security and reduction of poverty. Farming practices and methods, throughout the fresh produce value chain, influence the quality of the final product, which in turn determines its success in the market. This study’s aim was to therefore determine the extent to which training on organic farming methods, including modules such as Importance of Production Hygiene, influenced the hygienic farming practices employed by eTholeni small-scale organic farmers in uMbumbulu, KwaZulu-Natal- South Africa. Questionnaires were administered to 73 uncertified organic farmers and analysis showed that a total of 33 farmers were trained and supplied the local Agri-Hub while 40 had not received training. The questionnaire probed respondents’ attitudes, knowledge of hygiene and composting practices. Data analysis included descriptive statistics such as the Chi-square test and a logistic regression model. Descriptive analysis indicated that a majority of the farmers (60%) were female, most of which (73%) were above the age of 40. The logistic regression indicated that factors such as farmer training and prior experience in the farming sector had a significant influence on hygiene practices both at 5% significance levels. These results emphasize the importance of training, education and farming experience in implementing good hygiene practices in small-scale farming. It is therefore recommended that South African policies should advocate for small-scale farmer training, not only for subsistence purposes, but also with an aim of supplying produce markets with high fresh produce.

Keywords: small-scale farmers, leafy salad vegetables, organic produce, food safety, hygienic practices, food security

Procedia PDF Downloads 418
21232 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 360
21231 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 469
21230 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 415
21229 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 80
21228 Developing Indoor Enhanced Bio Composite Vertical Smart Farming System for Climbing Food Plant

Authors: S. Mokhtar, R. Ibrahim, K. Abdan, A. Rashidi

Abstract:

The population in the world are growing in very fast rate. It is expected that urban growth and development would create serious questions of food production and processing, transport, and consumption. Future smart green city policies are emerging to support new ways of visualizing, organizing and managing the city and its flows towards developing more sustainable cities in ensuring food security while maintaining its biodiversity. This is a survey paper analyzing the feasibility of developing a smart vertical farming system for climbing food plant to meet the need of food consumption in urban cities with an alternative green material. This paper documents our investigation on specific requirement for farming high valued climbing type food plant suitable for vertical farming, development of appropriate biocomposite material composition, and design recommendations for developing a new smart vertical farming system inside urban buildings. Results include determination of suitable specific climbing food plant species and material manufacturing processes for reinforcing natural fiber for biocomposite material. The results are expected to become recommendations for developing alternative structural materials for climbing food plant later on towards the development of the future smart vertical farming system. This paper contributes to supporting urban farming in cities and promotes green materials for preserving the environment. Hence supporting efforts in food security agenda especially for developing nations.

Keywords: biocomposite, natural reinforce fiber, smart farming, vertical farming

Procedia PDF Downloads 162
21227 Management as a Proxy for Firm Quality

Authors: Petar Dobrev

Abstract:

There is no agreed-upon definition of firm quality. While profitability and stock performance often qualify as popular proxies of quality, in this project, we aim to identify quality without relying on a firm’s financial statements or stock returns as selection criteria. Instead, we use firm-level data on management practices across small to medium-sized U.S. manufacturing firms from the World Management Survey (WMS) to measure firm quality. Each firm in the WMS dataset is assigned a mean management score from 0 to 5, with higher scores identifying better-managed firms. This management score serves as our proxy for firm quality and is the sole criteria we use to separate firms into portfolios comprised of high-quality and low-quality firms. We define high-quality (low-quality) firms as those firms with a management score of one standard deviation above (below) the mean. To study whether this proxy for firm quality can identify better-performing firms, we link this data to Compustat and The Center for Research in Security Prices (CRSP) to obtain firm-level data on financial performance and monthly stock returns, respectively. We find that from 1999 to 2019 (our sample data period), firms in the high-quality portfolio are consistently more profitable — higher operating profitability and return on equity compared to low-quality firms. In addition, high-quality firms also exhibit a lower risk of bankruptcy — a higher Altman Z-score. Next, we test whether the stocks of the firms in the high-quality portfolio earn superior risk-adjusted excess returns. We regress the monthly excess returns on each portfolio on the Fama-French 3-factor, 4-factor, and 5-factor models, the betting-against-beta factor, and the quality-minus-junk factor. We find no statistically significant differences in excess returns between both portfolios, suggesting that stocks of high-quality (well managed) firms do not earn superior risk-adjusted returns compared to low-quality (poorly managed) firms. In short, our proxy for firm quality, the WMS management score, can identify firms with superior financial performance (higher profitability and reduced risk of bankruptcy). However, our management proxy cannot identify stocks that earn superior risk-adjusted returns, suggesting no statistically significant relationship between managerial quality and stock performance.

Keywords: excess stock returns, management, profitability, quality

Procedia PDF Downloads 87
21226 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 615
21225 High-Quality Flavor of Black Belly Pork under Lightning Corona Discharge Using Tesla Coil for High Voltage Education

Authors: Kyung-Hoon Jang, Jae-Hyo Park, Kwang-Yeop Jang, Dongjin Kim

Abstract:

The Tesla coil is an electrical resonant transformer circuit designed by inventor Nikola Tesla in 1891. It is used to produce high voltage, low current and high frequency alternating current electricity. Tesla experimented with a number of different configurations consisting of two or sometimes three coupled resonant electric circuits. This paper focuses on development and high voltage education to apply a Tesla coil to cuisine for high quality flavor and taste conditioning as well as high voltage education under 50 kV corona discharge. The result revealed that the velocity of roasted black belly pork by Tesla coil is faster than that of conventional methods such as hot grill and steel plate etc. depending on applied voltage level and applied voltage time. Besides, carbohydrate and crude protein increased, whereas natrium and saccharides significantly decreased after lightning surge by Tesla coil. This idea will be useful in high voltage education and high voltage application.

Keywords: corona discharge, Tesla coil, high voltage application, high voltage education

Procedia PDF Downloads 323
21224 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 468
21223 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 107
21222 Analysing Trends in Rice Cropping Intensity and Seasonality across the Philippines Using 14 Years of Moderate Resolution Remote Sensing Imagery

Authors: Bhogendra Mishra, Andy Nelson, Mirco Boschetti, Lorenzo Busetto, Alice Laborte

Abstract:

Rice is grown on over 100 million hectares in almost every country of Asia. It is the most important staple crop for food security and has high economic and cultural importance in Asian societies. The combination of genetic diversity and management options, coupled with the large geographic extent means that there is a large variation in seasonality (when it is grown) and cropping intensity (how often it is grown per year on the same plot of land), even over relatively small distances. Seasonality and intensity can and do change over time depending on climatic, environmental and economic factors. Detecting where and when these changes happen can provide information to better understand trends in regional and even global rice production. Remote sensing offers a unique opportunity to estimate these trends. We apply the recently published PhenoRice algorithm to 14 years of moderate resolution remote sensing (MODIS) data (utilizing 250m resolution 16 day composites from Terra and Aqua) to estimate seasonality and cropping intensity per year and changes over time. We compare the results to the surveyed data collected by International Rice Research Institute (IRRI). The study results in a unique and validated dataset on the extent and change of extent, the seasonality and change in seasonality and the cropping intensity and change in cropping intensity between 2003 and 2016 for the Philippines. Observed trends and their implications for food security and trade policies are also discussed.

Keywords: rice, cropping intensity, moderate resolution remote sensing (MODIS), phenology, seasonality

Procedia PDF Downloads 297
21221 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 492
21220 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 233
21219 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 284
21218 High Arousal and Athletic Performance

Authors: Turki Mohammed Al Mohaid

Abstract:

High arousal may lead to inhibited athletic performance, or high positive arousal may enhance performance is controversial. To evaluate and review this issue, 31 athletes (all male) were induced into high pre-determined goal arousal and high arousal without pre-determined goal motivational states and tested on a standard grip strength task. Paced breathing was used to change psychological and physiological arousal. It was noted that significant increases in grip strength performance occurred when arousal was high and experienced as delighted, happy, and pleasant excitement in those with no pre-determined goal motivational states. Blood pressure, heart rate, and other indicators of physiological activity were not found to mediate between psychological arousal and performance. In a situation where athletic performance necessitates maximal motor strength over a short period, performance benefits of high arousal may be enhanced by designing a specific motivational state.

Keywords: high arousal, athletic, performance, physiological

Procedia PDF Downloads 110
21217 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 326