Search results for: security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7760

Search results for: security challenges

7010 Challenges Novice Arabic Language Teachers Face Related to Using Educational Technologies in Saudi Schools

Authors: Wesal Maash

Abstract:

This paper is part of a PhD mixed-method project currently conducted in the Saudi context. This paper explores the challenges novice Arabic language teachers (ALT) face when starting the teaching profession through semi-structured interviews with ten teachers and a questionnaire with 208 teachers. The data provided details of the challenges faced by those teachers and reasons why they face such a challenge. From the data, it can be deduced that schools are advanced and updated continuously, and the preparation program does not cope with that. This situation makes teachers struggle to cover the gap between what they learnt in their preparation and what is expected from them as teachers when they started their teaching profession. This paper suggests conducting further research to better understand this phenomenon by shedding light on the content of teachers' preparation programs.

Keywords: educational technologies, novice teachers, arabic language teachers, Saudi Arabia

Procedia PDF Downloads 69
7009 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 426
7008 Sustainable Water Resource Management and Challenges in Indian Agriculture

Authors: Rajendra Kumar Isaac, Monisha Isaac

Abstract:

India, having a vast cultivable area and regional climatic variability, encounters water Resource Management Problems at various levels. The agricultural production of India needs to be increased to meet out projected population growth. Sustainable water resource is the only option to ensure food security, especially in northern Indian states, where the ground and surface water resources are fast depleting. Various tools and technologies available for management of scarce water resources have been discussed. It was concluded that multiple use of water, adopting latest water management options, identification of climate adoptable cropping and farming systems, can enhance water productivity and would encounter the fast growing water management and water shortage problems in Indian agriculture.

Keywords: water resource management, sustainable, water management technologies, water productivity, agriculture

Procedia PDF Downloads 385
7007 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 111
7006 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 147
7005 Arabic Language in Modern Era: Some Challenges

Authors: Tajudeen Yusuf

Abstract:

Arabic language and its instruction occupy a prominent status in the contemporary world, especially in academic and research institutions. Arabic, like other international languages, consolidates understanding among people of different nations and societies. It is a promising medium of sharing thoughts and feelings. As a means of communication and interaction, the language has gained its outstanding status since ancient times, especially because of the relationship it maintains with Islam and its heritage. Adding to its importance is the rapid growth and advancement of Science and Technology in the contemporary Era which has eventually made communication between human societies all over the world inevitable. Despite, the Arabic language still experiences many challenges especially in some area such as irrelevant textbooks and other teaching materials, old versions of teaching methods and inadequate teachers who professionally trained. Eventually, these have resulted in difficulties in the teaching and learning of the language. Therefore, urgent and necessary measures to enhance the teaching and learning of Arabic language within and outside Arab countries are therefore needed to be taken.

Keywords: Arabic, language, challenges, modern era

Procedia PDF Downloads 583
7004 Teacher Professional Development in Saudi Arabia: Challenges and Possibilities

Authors: Ohood Alshammary

Abstract:

This study explores the current situation of teacher professional development, focusing on challenges experienced by English language teachers at a Saudi Arabian university. The study examines the current context of English language department (ELD) teachers in relation to PD activities available and the nature of the challenges they face in their attempts to engage in PD. The study adopted an interpretive approach to understanding the current situation of teachers working at the English language department (ELD) at one Saudi Arabian university. The study's findings reveal that participating teachers were aware of the significance of PD but were disappointed that the voices of teachers were not heard. The research reveals many challenges; lack of autonomy, insufficient time, heavy workloads, unsupportive working environments, and PD activities that were not considered necessary by the participants. Teachers viewed PD as subject to a top-down system, causing them to feel professionally undermined, lacking autonomy, and forced to comply with university rules. The study makes several recommendations for improving the PD experience and helping raise institutional awareness of the need to encourage teacher engagement and recommend enhancements to ELD teachers' professional development based on teachers' perspectives.

Keywords: adult learning., professional development, PD challenge, teacher perspective

Procedia PDF Downloads 53
7003 Thermo-Hydro-Mechanical-Chemical Coupling in Enhanced Geothermal Systems: Challenges and Opportunities

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Geothermal reservoirs (GTRs) have garnered global recognition as a sustainable energy source. The Thermo-Hydro-Mechanical-Chemical (THMC) integration coupling proves to be a practical and effective method for optimizing production in GTRs. The study outcomes demonstrate that THMC coupling serves as a versatile and valuable tool, offering in-depth insights into GTRs and enhancing their operational efficiency. This is achieved through temperature analysis and pressure changes and their impacts on mechanical properties, structural integrity, fracture aperture, permeability, and heat extraction efficiency. Moreover, THMC coupling facilitates potential benefits assessment and risks associated with different geothermal technologies, considering the complex thermal, hydraulic, mechanical, and chemical interactions within the reservoirs. However, THMC-coupling utilization in GTRs presents a multitude of challenges. These challenges include accurately modeling and predicting behavior due to the interconnected nature of processes, limited data availability leading to uncertainties, induced seismic events risks to nearby communities, scaling and mineral deposition reducing operational efficiency, and reservoirs' long-term sustainability. In addition, material degradation, environmental impacts, technical challenges in monitoring and control, accurate assessment of resource potential, and regulatory and social acceptance further complicate geothermal projects. Addressing these multifaceted challenges is crucial for successful geothermal energy resources sustainable utilization. This paper aims to illuminate the challenges and opportunities associated with THMC coupling in enhanced geothermal systems. Practical solutions and strategies for mitigating these challenges are discussed, emphasizing the need for interdisciplinary approaches, improved data collection and modeling techniques, and advanced monitoring and control systems. Overcoming these challenges is imperative for unlocking the full potential of geothermal energy making a substantial contribution to the global energy transition and sustainable development.

Keywords: geothermal reservoirs, THMC coupling, interdisciplinary approaches, challenges and opportunities, sustainable utilization

Procedia PDF Downloads 48
7002 Challenges in Teaching Code of Ethics and Professional Conduct

Authors: Rasika Dayarathna

Abstract:

Computing has reached every corner of our lives in many forms. The Internet, particularly Social Media, Artificial Intelligence, are prominent among them. As a result, computing has changed our lives and it is expected that severe changes will take place in the coming years. It has introduced a new set of ethical challenges and amplified the existing ethical challenges. It is the duty of everyone involved from conceptualizing, designing, implementing, deploying, and using to follow generally accepted practices in order to avoid or minimize harm and improve the quality of life. Since computing in various forms mentioned above has a significant impact on our lives, various codes of conduct and standards have been introduced. Among many, the ACM (Association of Computing Machinery) Code of Ethics and Professional Conduct is a leading one. This was drafted for everyone, including aspiring computing professionals. However, teaching a code of conduct for aspiring computing professionals is very challenging since this universal code needs to be taught for young computing professionals in a local setting where there are value mismatches and exposure to information systems. This paper discusses the importance of teaching the code, how to overcome the challenges, and suggestions to improve the code to make it more appealing and buying in. It is expected that the improved approach would contribute to improving the quality of life.

Keywords: code of conduct, professionalism, ethics, code of ethics, ethics education, moral development

Procedia PDF Downloads 162
7001 The Challenges of Irrigated Tomato Production in Kano State, Nigeria

Authors: I. K. Adamu, J. O. Adefila

Abstract:

The paper examines the challenges of irrigated tomato growers in Kano State. Materials used for the study are sourced from newspapers, books, internet and field surveys. Questionnaires were also used to sample the opinion of the tomato farmers in the state. The purposive and snow ball sampling techniques were used to select knowledgeable individual farmers in the study areas. The sample size was based on a five percent (0.05) of the identified members of tomato farmers. Data analysis was achieved using cross-tabulation, percentage, and SWOT analysis. The study reveals that irrigated tomato farmers in Kano State faces a lot of challenges. The study offers some recommendations such as establishment of storage facilities on ground, establishment of processing industries in the state, and introduction of high yield varieties of tomato seeds instead of the outdated UC82B.

Keywords: SWOT, irrigated tomato production, tomato farmers, Nigeria

Procedia PDF Downloads 376
7000 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 91
6999 Jung GPT: Unveiling the Therapeutic Potential of Artificial Intelligence

Authors: Eman Alhajjar, Albatool Jamjoom, Fatmah Bugshan

Abstract:

This research aims to investigate the artificial intelligence (AI) application Jung GPT and how helpful it is, as a therapy AI, to users. Jung GPT has the potential to make mental health care more accessible and cheaper while also providing tailored support and advice. However, it is not intended to be a substitute for human therapists. Jung GPT is instructed to understand a wide range of concepts, including emojis, sensitive subjects, and various languages. Furthermore, participants were asked to fill out a survey based on their experience with Jung GPT. Additionally, analysis of the responses indicated that Jung GPT was helpful in identifying and exploring challenges, and the use of Jung GPT by participants in the future is highly possible. The results demonstrate that Jung GPT does help in recognizing challenges or problems within the users. On this basis, it is recommended that individuals use Jung GPT to explore their thoughts, feelings, and challenges. Moreover, further research is needed to better evaluate the effectiveness of Jung GPT.

Keywords: Jung GPT, artificial intelligence, therapy, mental health, AI application

Procedia PDF Downloads 50
6998 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 322
6997 Anatomy of the Challenges, Problems and Prospects of Polytechnic Administration in North-Central Nigeria

Authors: A. O. Osabo

Abstract:

Polytechnic education is often described as the only sustainable academic institution that can propel massive industrial and technological growth and development in all sectors of the Nigerian economy. Because of its emphasis on science and technology, practical demonstration of skills and pivotal role in the training of low-and-high-cadre technologists and technocrats to man critical sectors of the economy, the administration of polytechnics needs to be run according to global best standards and practices in order to achieve their goals and objectives. Besides, the polytechnics need to be headed by seasoned and academically sound professionals to pursue the goals and objectives of the schools as centres of technology, learning and academic excellence. Over the years, however, polytechnics in Nigeria have suffered a wide myriad of administrative problems and challenges which have prevented them from achieving their basic goals and objectives. Apart from regulatory problems and challenges, some heads of polytechnics do not demonstrate leadership and management skills in bringing the desired innovations in the management of the polytechnics under them. These have resulted, in most cases, to the polytechnics not performing optimally in its mandate. This paper examines the administrative problems, challenges and prospects of polytechnics education in north-central Nigeria. Using a total of 97 questionnaires consisting of semi-structured interviews of yes-or-no questions shared among staff and students of the selected polytechnics and a descriptive statistical method of analysis, the study found that the inability of the polytechnics to meet their goals and objectives is caused by administrative and organizational problems and challenges, bordering on funding, accreditation, manpower, corruption and maladministration, among others. The paper thus suggests that the leadership of the polytechnics must rise up to the demands of the time in order to deal with the administrative problems and challenges affecting them and fulfill the goals and objectives for which the schools were established.

Keywords: education, administration, polytechnic, accreditation, Nigerian

Procedia PDF Downloads 251
6996 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana

Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.

Abstract:

Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.

Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security

Procedia PDF Downloads 91
6995 Fertilizer Procurement and Distribution in Nigeria: Assessing Policy against Implementation

Authors: Jacob Msughter Gwa, Rhys Williams

Abstract:

It is widely known that food security is a major concern in Sub-Saharan Africa. In many regions, including Nigeria, this is due to an agriculture-old problem of soil erosion beyond replacement levels. It seems that the use of fertilizer would be an immediate solution as it can boost agricultural productivity, and low agricultural productivity is attributed to the low use of fertilizers in Nigeria. The Government of Nigeria has been addressing the challenges of food shortage but with limited success. The utilisation of a practical and efficient subsidy programme in addressing this issue seems to be needed. However, the problem of procurement and distribution changes from one stage of subsidy to another. This paper looks at the difference between the ideal and the actual implementation of agricultural fertilizer policies in Nigeria, as it currently runs the risk of meeting required standards on paper but missing the desired real outcomes, and recognises the need to close the gap between the paper work and the realities on the ground.

Keywords: agricultural productivity, fertilizer distribution, fertilizer procurement, Nigeria

Procedia PDF Downloads 342
6994 Enhancing Small and Medium Enterprises Access to Finance: The Opportunities and Challenges of Using Intellectual Property Rights as Collateral in Sri Lanka

Authors: Nihal Chandratilaka Matara Arachchige, Nishantha Sampath Punichihewa

Abstract:

Intellectual property (IP) assets are the ‘crown-jewels’ of innovation-driven businesses in the knowledge-based economy. In that sense, IP rights such as patents, trademarks and copyrights afford enormous economic opportunities to an enterprise, especially Small and Medium Enterprise (SME). As can be gleaned from the latest statistics, the domestic industries in Sri Lanka are predominantly represented by SMEs. Undeniably, in terms of economic contribution, the SME sector is considered to be the backbone of the country’s ‘real economy’. However, the SME sector in Sri Lanka faces number of challenges. One of the nearly-insurmountable-hurdles for small businesses is the access to credit facilities, due to the lack of collateral. In the eyes of law, the collateral is something pledged as security for repayment in the event of default. Even though the intellectual property rights are used as collateral in order to facilitate obtaining credit for businesses in number of Asian jurisdictions, financial institutions in Sri Lanka are extremely reluctant to accept IP rights as collateral for granting financial resources to SMEs. Against this backdrop, this research investigates from a legal perspective reasons for not accepting IP rights as collateral when granting loans for SMEs. Drawing emerging examples from other jurisdiction, it further examines the inadequacies of existing legal framework in relation to the use of IP rights as collateral. The methodology followed in this paper is qualitative research. Empirical research and analysis concerning the core research question are carried out by conducting in-depth interviews with stakeholders, including leading financial institutions in Sri Lanka.

Keywords: intellectual property assets, SMEs, collaterals financial facilities, credits

Procedia PDF Downloads 259
6993 Feasibility Study of Iraq' Decomposition and Its Effects on the Region

Authors: Ebrahim Rahmani, Siyamak Moazeni

Abstract:

According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.

Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan

Procedia PDF Downloads 311
6992 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 254
6991 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 80
6990 The Role and Challenges of Social Workers in Child Protection: The Case of Indonesia

Authors: B. Rusyidi

Abstract:

Since 2009, the Indonesian Ministry of Social Affairs has been implementing Program Kesejahteraan Sosial Anak (PKSA) (Child Welfare Program) a conditional cash transfer program that targets neglected children, children with disabilities, street children, children in conflict with the law, and children in need of special protection, all from poor households. PKSA integrates three elements: Transfer of cash, care and social services through social workers, and institutional childcare assistance. This qualitative study analyzed the roles and the challenges of social workers in implementing PKSA and lays out recommendations to inform policy changes. Data were collected in late 2014 from national and local government and non-government child welfare agencies, social workers, and childcare institution representatives through interviews and Focused Group Discussions (FGDs). Field work took place in six districts in the provinces of Jakarta, Central Java and South Sulawesi. The study found that the social workers’ role was significant in facilitating cash transfer, providing education and guidance, and linking children and families to basic social services. This improved utilization of basic social services enhanced children and families’ behaviors and contributed to the well being of the children. However, only a small number of childcare institutions have social workers, leaving many children and families without care and social service linkages, depriving them of rehabilitative components to help them regain their social functions. Some social workers reported their struggles with heavy workloads, lack of professional competencies and training, limited job security, and inadequate professional acknowledgment from other professions. Parts of those challenges were due to the centralized nature of the program and the lack of shared vision and commitment about the child protection system among related government agencies both at the national and local levels. The study highlights the necessity to implement an integrated child protection system, decentralize the PKSA program, and increase the number, competence, case management, and management and monitoring of social workers. The most recent progress of the program and its impacts on social workers are also discussed.

Keywords: child protection, conditional cash transfer, program decentralization, social worker, working conditions

Procedia PDF Downloads 202
6989 US-India Strategic Bargaining and Power Balancing in South Asia

Authors: Anila Syed, Manzoor Ahmad

Abstract:

The relationship between United States and India has transformed from estrangement to wider engagement since 2004. With the convergence of interests and shared values both the US and India came close towards each other and evolved strategic partnership through civil nuclear cooperation. This paper analyze the cost and benefit of strategic partnership with India for US, the impact of India’s emergence as regional power on South Asian balance of power and its impact on Pak-US relationship. It also focuses on security structure of the region and challenges for the US to maintain strategic partnership with two rival states (India and Pakistan). The work also gives some recommendations for balancing power in the region in order to ensure durable peace not only between India and Pakistan but also in south Asia.

Keywords: US-India strategic partnership, civil-nuclear cooperation, balance of power, impacts on Pak-US relationship

Procedia PDF Downloads 389
6988 Challenges in Learning Legal English from the Students’ Perspective at Hanoi Law University

Authors: Nhac Thanh Huong

Abstract:

Legal English, also known as Language of the Law (Mellinkoff, David. 2004), is an indispensable factor contributing to the development of legal field. At Hanoi Law University, legal English is a compulsory subject in the syllabus of legal English major; International Trade law and Fast-track law training program. The question that what obstacles students face with when dealing with legal English, however, has not been answered at that institution. Therefore, this present research, which makes use of survey questionnaires as the main method, aims to study the challenges of learning legal English from the students’ perspective, from which some useful solutions are drawn up to overcome these difficulties and improve the effectiveness of learning legal English. The results indicate notable difficulties arising from the level of general English skills, the characteristics of legal English and legal background knowledge. These findings lay a scientific foundation for suggesting some solutions for practical applications in teaching as well as learning legal English among both teachers and students.

Keywords: challenges, HLU, Legal English, students' perspective

Procedia PDF Downloads 181
6987 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 527
6986 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 625
6985 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review

Authors: Gholamreza Farrokhi, Behzad Sani

Abstract:

The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.

Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future

Procedia PDF Downloads 338
6984 The Challenge of Teaching French as a Foreign Language in a Multilingual Community

Authors: Carol C. Opara, Olukemi E. Adetuyi-Olu-Francis

Abstract:

The teaching of French language, like every other language, has its numerous challenges. A multilingual community, however, is a linguistic environment housing diverse languages, each with its peculiarity, both pros, and cones. A foreign language will have to strive hard for survival in an environment where various indigenous languages, as well as an established official language, exist. This study examined the challenges and prospects of the teaching of French as a foreign language in a multilingual community. A 22-item questionnaire was used to elicit information from 40 Nigerian Secondary school teachers of French. One of the findings of this study showed that the teachers of the French language are not motivated. Also, the linguistic environment is not favourable for the teaching and learning of French language in Nigeria. One of the recommendations was that training and re-training of teachers of French should be of utmost importance to the Nigerian Federal Ministry of Education.

Keywords: challenges, french as foreign language, multilingual community, teaching

Procedia PDF Downloads 189
6983 Management of Indigenous Knowledge: Expectations of Library and Information Professionals in Developing Countries

Authors: Desmond Chinedu Oparaku, Pearl C. Akanwa, Oyemike Victor Benson

Abstract:

This paper examines the challenges facing library and information centers (LICs) in managing indigenous knowledge in academic libraries in developing countries. The need for managing an indigenous knowledge in library and information centers in developing nations is becoming more critical. There is an ever increasing output of indigenous knowledge; effective management of indigenous knowledge becomes necessary to enable the next generation benefit from them. This paper thus explores the concept of indigenous knowledge (IK), nature of indigenous knowledge (IK), the various forms of indigenous knowledge (IK), sources of indigenous knowledge (IK), and relevance of indigenous knowledge (IK). The expectations of library and information professionals towards effective management of indigenous knowledge and the challenges to effective management of indigenous knowledge were highlighted. Recommendations were made based on the identified challenges.

Keywords: library, indigenous knowledge, information centres, information professionals

Procedia PDF Downloads 407
6982 Computational Approaches for Ballistic Impact Response of Stainless Steel 304

Authors: A. Mostafa

Abstract:

This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.

Keywords: ballistic velocity, stainless steel, numerical approaches, security screen

Procedia PDF Downloads 142
6981 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 90