Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14018

Search results for: communication with physical layer security

13238 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 461
13237 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 312
13236 Application of Griddization Management to Construction Hazard Management

Authors: Lingzhi Li, Jiankun Zhang, Tiantian Gu

Abstract:

Hazard management that can prevent fatal accidents and property losses is a fundamental process during the buildings’ construction stage. However, due to lack of safety supervision resources and operational pressures, the conduction of hazard management is poor and ineffective in China. In order to improve the quality of construction safety management, it is critical to explore the use of information technologies to ensure that the process of hazard management is efficient and effective. After exploring the existing problems of construction hazard management in China, this paper develops the griddization management model for construction hazard management. First, following the knowledge grid infrastructure, the griddization computing infrastructure for construction hazards management is designed which includes five layers: resource entity layer, information management layer, task management layer, knowledge transformation layer and application layer. This infrastructure will be as the technical support for realizing grid management. Second, this study divides the construction hazards into grids through city level, district level and construction site level according to grid principles. Last, a griddization management process including hazard identification, assessment and control is developed. Meanwhile, all stakeholders of construction safety management, such as owners, contractors, supervision organizations and government departments, should take the corresponding responsibilities in this process. Finally, a case study based on actual construction hazard identification, assessment and control is used to validate the effectiveness and efficiency of the proposed griddization management model. The advantage of this designed model is to realize information sharing and cooperative management between various safety management departments.

Keywords: construction hazard, griddization computing, grid management, process

Procedia PDF Downloads 262
13235 Interdisciplinary Integrated Physical Education Program Using a Philosophical Approach

Authors: Ellie Abdi, Susana Juniu

Abstract:

The purpose of this presentation is to describe an interdisciplinary teaching program that integrates physical education concepts using a philosophical approach. The presentation includes a review of: a) the philosophy of American education, b) the philosophy of sports and physical education, c) the interdisciplinary physical education program, d) professional development programs, (e) the Success of this physical education program, f) future of physical education. This unique interdisciplinary program has been implemented in an urban school physical education discipline in East Orange, New Jersey for over 10 years. During the program the students realize that the bodies go through different experiences. The body becomes a place where a child can recognize in an enjoyable way to express and perceive particular feelings or mental states. Children may distinguish themselves to have high abilities in the social or other domains but low abilities in the field of athletics. The goal of this program for the individuals is to discover new skills, develop and demonstrate age appropriate mastery level at different tasks, therefore the program consists of 9 to 12 sports, including many game. Each successful experience increases the awareness ability. Engaging in sports and physical activities are social movements involving groups of children in situations such as teams, friends, and recreational settings, which serve as a primary socializing agent for teaching interpersonal skills. As a result of this presentation the audience will reflect and explore how to structure a physical education program to integrate interdisciplinary subjects with philosophical concepts.

Keywords: interdisciplinary disciplines, philosophical concepts, physical education, interdisciplinary teaching program

Procedia PDF Downloads 483
13234 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 146
13233 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 150
13232 Analyzing the Importance of Technical Writing in Professional Industry of Pakistan

Authors: Sadaf Khalid, Jahanzaib Sarwar, Rabia Touseef

Abstract:

No matter how much perfect we become in our practical skills regarding the implementation of learned ideas, the need of technical writing capability cannot be neglected to be a professional. Technical writing is a way of communicating the ideas in written which, otherwise, need to be presented orally. Technical writing skills have always been the need of the time, as they are required for internal, as well as external official communication in both formal and informal manner. Moreover, they are the best way to capture the attention of your customers by presenting information in an effective manner. This paper aims to analyze the importance of technical writing skills in professional industries of Pakistan by conducting a survey. Survey results presented in this paper clearly depicts the importance of formal and informal written communication media used in different professional industries in Pakistan. Analysis and discussion of the extent to which the alternative ways of communication besides technical writing have got importance in Pakistan is also an important aspect of this survey.

Keywords: technical writing, survey, oral communication, globalization, communication trends, formal communication media, informal communication, audience

Procedia PDF Downloads 405
13231 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 81
13230 Investigation of the Relationship between Physical Activity and Stress and Mental Health in the Elderly

Authors: Mohamad Reza Khodabakhsh

Abstract:

Physical activity is important because it affects the stress and mental health of the elderly. The purpose of this research is to examine the relationship between the physical activity of the elderly and stress and mental health. The current research is correlational research, and the studied population includes all the elderly who are engaged in sports in the parks of Mashhad city in 2021. The whole community consists of 200 people. Sampling was done by the headcount method. The tool used in this research is a questionnaire. The physical activity questionnaire is Likert. General GHQ is based on the self-report method. The study method is correlation type to find the relationship between predictor and predicted variables, and the multiple regression method was used for the relationships between the sub-components. And the results showed that physical activity has the effect of reducing the stress of the elderly and improving their mental health. In general, the results of this research indicate the confirmation of the research hypotheses.

Keywords: relationship, physical activity, stress, mental health, elderly

Procedia PDF Downloads 79
13229 The Effect of Physical Activity and Responses of Leptin

Authors: Sh. Khoshemehry, M. J. Pourvaghar, M. E. Bahram

Abstract:

In modern life, daily physical activity is relatively reduced, which is why the incidence of some diseases associated with overweight and obesity, such as hypertension, diabetes and other chronic illnesses, even in young people are observed. Obesity and overweight is one of the most common metabolic disorders in industrialized countries and in developing countries. One consequence of pathological obesity is cardiovascular disease and metabolic syndrome. In the past, it was believed that adipose tissue was ineffective and served only for storing triglycerides. In this review article, it was tried to refer to the esteemed scientific sources about physical activity and responses of leptin.

Keywords: disease, leptin, obesity, physical activity

Procedia PDF Downloads 331
13228 Control Flow around NACA 4415 Airfoil Using Slot and Injection

Authors: Imine Zakaria, Meftah Sidi Mohamed El Amine

Abstract:

One of the most vital aerodynamic organs of a flying machine is the wing, which allows it to fly in the air efficiently. The flow around the wing is very sensitive to changes in the angle of attack. Beyond a value, there is a phenomenon of the boundary layer separation on the upper surface, which causes instability and total degradation of aerodynamic performance called a stall. However, controlling flow around an airfoil has become a researcher concern in the aeronautics field. There are two techniques for controlling flow around a wing to improve its aerodynamic performance: passive and active controls. Blowing and suction are among the active techniques that control the boundary layer separation around an airfoil. Their objective is to give energy to the air particles in the boundary layer separation zones and to create vortex structures that will homogenize the velocity near the wall and allow control. Blowing and suction have long been used as flow control actuators around obstacles. In 1904 Prandtl applied a permanent blowing to a cylinder to delay the boundary layer separation. In the present study, several numerical investigations have been developed to predict a turbulent flow around an aerodynamic profile. CFD code was used for several angles of attack in order to validate the present work with that of the literature in the case of a clean profile. The variation of the lift coefficient CL with the momentum coefficient

Keywords: CFD, control flow, lift, slot

Procedia PDF Downloads 181
13227 Different Cultures, Different Communication Styles: Dating Interaction in Australian and Chinese TV Dating Shows

Authors: Ping Yang

Abstract:

Dating interaction between males and females remains an interesting and mysterious event, particularly in different cultural contexts. This paper focuses on a comparative study of different communication styles males and females use while engaged in dating interaction in the Australian and Chinese contexts. Using communication accommodation theory (CAT) as an analytical framework, the researcher studies how the Australian males and females used a generally different communication style in an Australian dating show (Married at First Sight) than that used by their Chinese counterparts in a Chinese one (非诚勿扰, You Are the One). Based on the qualitative data analysis through NVivo 12 as a research tool, the researcher finds that Australian males and females generally use a divergent communication style characterized by self-orientation, directness, and confrontation, while Chinese counterparts use a convergent communication style characterized by other-orientation, indirectness, and non-confrontation. The researcher concludes with two possible reasons behind the similar TV dating event but with different dramas. One is due to different cultures with varying styles of communication, and the other is because of different drama effect designs suitable for different audience expectations in different cultural contexts.

Keywords: communication styles, cultural contexts, face-to-face interaction, TV dating.

Procedia PDF Downloads 76
13226 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 555
13225 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 61
13224 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 379
13223 The Reliability of Wireless Sensor Network

Authors: Bohuslava Juhasova, Igor Halenar, Martin Juhas

Abstract:

The wireless communication is one of the widely used methods of data transfer at the present days. The benefit of this communication method is the partial independence of the infrastructure and the possibility of mobility. In some special applications it is the only way how to connect. This paper presents some problems in the implementation of a sensor network connection for measuring environmental parameters in the area of manufacturing plants.

Keywords: network, communication, reliability, sensors

Procedia PDF Downloads 643
13222 Effect of Resistance Training on Muscle Strength, IGF₁, and Physical Performance of Volleyball Players

Authors: Menan M. Elsayed, Hussein A. Heshmat

Abstract:

The aim of the study is to assess the effect of resistance training on muscle strength and physical performance of volleyball players of Physical Education College, Helwan University. The researcher used the experimental method of pre-post measurements of one group of 10 volleyball players. The execution of the program was through the period of 12/8/2018 to 12/10/2018; included 24 training units, 3 training units weekly for 8 weeks. The training program revealed an improvement in post measurement of muscle strength, IGF₁ (insulin-like growth factor 1), and physical performance of players. It may be concluded that the resistance training may include changes in hormones and muscle fibers leading to hypertrophy of the muscle and physical performance. It is recommended to use the results of the study in rationing the loads and training programs.

Keywords: IGF₁, muscle strength, physical performance, resistance training, volleyball players

Procedia PDF Downloads 181
13221 Doctor-Patient Interaction in an L2: Pragmatic Study of a Nigerian Experience

Authors: Ayodele James Akinola

Abstract:

This study investigated the use of English in doctor-patient interaction in a university teaching hospital from a southwestern state in Nigeria with the aim of identifying the role of communication in an L2, patterns of communication, discourse strategies, pragmatic acts, and contexts that shape the interaction. Jacob Mey’s Pragmatic Acts notion complemented with Emanuel and Emanuel’s model of doctor-patient relationship provided the theoretical standpoint. Data comprising 7 audio-recorded doctors-patient interactions were collected from a University Hospital in Oyo state, Nigeria. Interactions involving the use of English language were purposefully selected. These were supplemented with patients’ case notes and interviews conducted with doctors. Transcription was patterned alongside modified Arminen’s notations of conversation analysis. In the study, interaction in English between doctor and patients has the preponderance of direct-translation, code-mixing and switching, Nigerianism and use of cultural worldviews to express medical experience. Irrespective of these, three patterns communication, namely the paternalistic, interpretive, and deliberative were identified. These were exhibited through varying discourse strategies. The paternalistic model reflected slightly casual conversational conventions and registers. These were achieved through the pragmemic activities of situated speech acts, psychological and physical acts, via patients’ quarrel-induced acts, controlled and managed through doctors’ shared situation knowledge. All these produced empathising, pacifying, promising and instructing practs. The patients’ practs were explaining, provoking, associating and greeting in the paternalistic model. The informative model reveals the use of adjacency pairs, formal turn-taking, precise detailing, institutional talks and dialogic strategies. Through the activities of the speech, prosody and physical acts, the practs of declaring, alerting and informing were utilised by doctors, while the patients exploited adapting, requesting and selecting practs. The negotiating conversational strategy of the deliberative model featured in the speech, prosody and physical acts. In this model, practs of suggesting, teaching, persuading and convincing were utilised by the doctors. The patients deployed the practs of questioning, demanding, considering and deciding. The contextual variables revealed that other patterns (such as phatic and informative) are also used and they coalesced in the hospital within the situational and psychological contexts. However, the paternalistic model was predominantly employed by doctors with over six years in practice, while the interpretive, informative and deliberative models were found among registrar and others below six years of medical practice. Doctors’ experience, patients’ peculiarities and shared cultural knowledge influenced doctor-patient communication in the study.

Keywords: pragmatics, communication pattern, doctor-patient interaction, Nigerian hospital situation

Procedia PDF Downloads 168
13220 Engineering of Stable and Improved Electrochemical Activities of Redox Dominating Charge Storage Electrode Materials

Authors: Girish Sambhaji Gund

Abstract:

The controlled nanostructure growth and its strong coupling with the current collector are key factors to achieve good electrochemical performance of faradaic-dominant electroactive materials. We employed binder-less and additive-free hydrothermal and physical vapor doping methods for the synthesis of nickel (Ni) and cobalt (Co) based compounds nanostructures (NiO, NiCo2O4, NiCo2S4) deposited on different conductive substrates such as carbon nanotube (CNT) on stainless steel, and reduced graphene oxide (rGO) and N-doped rGO on nickel foam (NF). The size and density of Ni- and Co-based compound nanostructures are controlled through the strong coupling with carbon allotropes on stainless steel and NF substrates. This controlled nanostructure of Ni- and Co-based compounds with carbon allotropes leads to stable faradaic electrochemical reactions at the material/current collector interface and within the electrode, which is consequence of strong coupling of nanostructure with functionalized carbon surface as a buffer layer. Thus, it is believed that the results provide the synergistic approaches to stabilize electrode materials physically and chemically, and hence overall electrochemical activity of faradaic dominating battery-type electrode materials through buffer layer engineering.

Keywords: metal compounds, carbon allotropes, doping, electrochemicstry, hybrid supercapacitor

Procedia PDF Downloads 66
13219 The Response of Optical Properties to Temperature in Three-Layer Micro Device Under Influence of Casimir Force

Authors: Motahare Aali, Fatemeh Tajik

Abstract:

Here, we investigate the sensitivity the Casimir force and consequently dynamical actuation of a three-layer microswitch to some ambient conditions. In fact, we have considered the effect of optical properties on the stable operation of the microswitch for both good (e.g. metals) and poor conductors via a three layer Casimir oscillator. Indeed, gold (Au) has been chosen as a good conductor which is widely used for Casimir force measurements, and highly doped conductive silicon carbide (SiC) has been considered as a poor conductor which is a promising material for device operating under harsh environments. Also, the intervening stratum is considered ethanol or water. It is also supposed that the microswitches are frictionless and autonomous. Using reduction factor diagrams and bifurcation curves, it has been shown how performance of the microswitches is sensitive to temperature and intervening stratum, moreover it is investigated how the conductivity of the components can affect this sensitivity.

Keywords: Casimir force, optical properties, Lifshitz theory, dielectric function

Procedia PDF Downloads 75
13218 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 362
13217 Beam Deflection with Unidirectionality Due to Zeroth Order and Evanescent Wave Coupling in a Photonic Crystal with a Defect Layer without Corrugations under Oblique Incidence

Authors: Evrim Colak, Andriy E. Serebryannikov, Thore Magath, Ekmel Ozbay

Abstract:

Single beam deflection and unidirectional transmission are examined for oblique incidence in a Photonic Crystal (PC) structure which employs defect layer instead of surface corrugations at the interfaces. In all of the studied cases, the defect layer is placed such that the symmetry is broken. Two types of deflection are observed depending on whether the zeroth order is coupled or not. These two scenarios can be distinguished from each other by considering the simulated field distribution in PC. In the first deflection type, Floquet-Bloch mode enables zeroth order coupling. The energy of the zeroth order is redistributed between the diffraction orders at the defect layer, providing deflection. In the second type, when zeroth order is not coupled, strong diffractions cause blazing and the evanescent waves deliver energy to higher order diffraction modes. Simulated isofrequency contours can be utilized to estimate the coupling behavior. The defect layer is placed at varying rows, preserving the asymmetry of PC while evancescent waves can still couple to higher order modes. Even for deeply buried defect layer, asymmetric transmission and beam deflection are still encountered when the zeroth order is not coupled. We assume ε=11.4 (refractive index close to that of GaAs and Si) for the PC rods. A possible operation wavelength can be within microwave and infrared range. Since the suggested material is low loss, the structure can be scaled down to operate higher frequencies. Thus, a sample operation wavelength is selected as 1.5μm. Although the structure employs no surface corrugations transmission value T≈0.97 can be achieved by means of diffraction order m=-1. Moreover, utilizing an extra line defect, T value can be increased upto 0.99, under oblique incidence even if the line defect layer is deeply embedded in the photonic crystal. The latter configuration can be used to obtain deflection in one frequency range and can also be utilized for the realization of another functionality like defect-mode wave guiding in another frequency range but still using the same structure.

Keywords: asymmetric transmission, beam deflection, blazing, bi-directional splitting, defect layer, dual beam splitting, Floquet-Bloch modes, isofrequency contours, line defect, oblique incidence, photonic crystal, unidirectionality

Procedia PDF Downloads 250
13216 Load-Enabled Deployment and Sensing Range Optimization for Lifetime Enhancement of WSNs

Authors: Krishan P. Sharma, T. P. Sharma

Abstract:

Wireless sensor nodes are resource constrained battery powered devices usually deployed in hostile and ill-disposed areas to cooperatively monitor physical or environmental conditions. Due to their limited power supply, the major challenge for researchers is to utilize their battery power for enhancing the lifetime of whole network. Communication and sensing are two major sources of energy consumption in sensor networks. In this paper, we propose a deployment strategy for enhancing the average lifetime of a sensor network by effectively utilizing communication and sensing energy to provide full coverage. The proposed scheme is based on the fact that due to heavy relaying load, sensor nodes near to the sink drain energy at much faster rate than other nodes in the network and consequently die much earlier. To cover this imbalance, proposed scheme finds optimal communication and sensing ranges according to effective load at each node and uses a non-uniform deployment strategy where there is a comparatively high density of nodes near to the sink. Probable relaying load factor at particular node is calculated and accordingly optimal communication distance and sensing range for each sensor node is adjusted. Thus, sensor nodes are placed at locations that optimize energy during network operation. Formal mathematical analysis for calculating optimized locations is reported in present work.

Keywords: load factor, network lifetime, non-uniform deployment, sensing range

Procedia PDF Downloads 366
13215 Uncovering Underwater Communication for Multi-Robot Applications via CORSICA

Authors: Niels Grataloup, Micael S. Couceiro, Manousos Valyrakis, Javier Escudero, Patricia A. Vargas

Abstract:

This paper benchmarks the possible underwater communication technologies that can be integrated into a swarm of underwater robots by proposing an underwater robot simulator named CORSICA (Cross platfORm wireleSs communICation simulator). Underwater exploration relies increasingly on the use of mobile robots, called Autonomous Underwater Vehicles (AUVs). These robots are able to reach goals in harsh underwater environments without resorting to human divers. The introduction of swarm robotics in these scenarios would facilitate the accomplishment of complex tasks with lower costs. However, swarm robotics requires implementation of communication systems to be operational and have a non-deterministic behaviour. Inter-robot communication is one of the key challenges in swarm robotics, especially in underwater scenarios, as communication must cope with severe restrictions and perturbations. This paper starts by presenting a list of the underwater propagation models of acoustic and electromagnetic waves, it also reviews existing transmitters embedded in current robots and simulators. It then proposes CORSICA, which allows validating the choices in terms of protocol and communication strategies, whether they are robot-robot or human-robot interactions. This paper finishes with a presentation of possible integration according to the literature review, and the potential to get CORSICA at an industrial level.

Keywords: underwater simulator, robot-robot underwater communication, swarm robotics, transceiver and communication models

Procedia PDF Downloads 293
13214 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 138
13213 Critical Factors Influencing Effective Communication Among Stakeholders on Construction Project Delivery in Jigawa State, Nigeria

Authors: Shazali Abdulahi

Abstract:

Project planning is the first phase in project life cycle which relates to the use of schedules such as Gantt charts to plan and subsequently report the project progress within the project environment. Likewise, project execution is the third phase in project lifecycle, is the phase where the work of the project must get done correctly and it’s the longest phase in the project lifecycle therefore, they must be effectively communicated, now today Communication has become the crucial element of every organization. During construction project delivery, information needs to be accurately and timely communicating among project stakeholders in order to realize the project objective. Effective communication among stakeholders during construction project delivery is one of the major factors that impact construction project delivery. Therefore, the aim of the research work is to examine the critical factors influencing effective communication among stakeholders on construction project delivery from the perspective of construction professionals (Architects, Builders, Quantity surveyors, and Civil engineers). A quantitative approach was adopted. This entailed the used of structured questionnaire to one (108) construction professionals in public and private organization within dutse metropolis. Frequency, mean, ranking and multiple linear regression using SPSS vision 25 software were used to analyses the data. The results show that Leadership, Trust, Communication tools, Communication skills, Stakeholders involvement, Cultural differences, and Communication technology were the most critical factors influencing effective communication among stakeholders on construction project delivery. The hypothesis revealed that, effective communication among stakeholders has significant effects on construction project delivery. This research work will profit the construction stakeholders in construction industry, by providing adequate knowledge regarding the factors influencing effective communication among stakeholders, so that necessary steps to be taken to improve project performance. Also, it will provide knowledge about the appropriate strategies to employ in order to improve communication among stakeholders.

Keywords: effetive communication, ineffective communication, stakeholders, project delivery

Procedia PDF Downloads 33
13212 The Role of Physical Capital on the Accessibility of Livelihood of Indigenous People

Authors: Anjli Pathak, Harshit Sosan Lakra, Smriti Mishra

Abstract:

The increasing urbanization affects the external environment in which people exist and imposes livelihood vulnerability to shocks and stresses. Although research on the linkages between urbanization and vulnerability has been increasing, only a few studies have examined the caste/ethnicity in livelihood vulnerability. In this study, we explore how physical capital influences vulnerability among indigenous people in the context of livelihood. The study identifies the dimensions and indicators of physical capital that influence the profile of household vulnerability in the livelihood-building process. The result identified five dimensions and 19 indicators of livelihood vulnerability. The study also visualizes the inter-relationship between physical capital and other livelihood capital in formulating the livelihood vulnerability framework.

Keywords: urbanization, livelihood vulnerability, indigenous people, physical capital

Procedia PDF Downloads 60
13211 The Importance of Visual Communication in Artificial Intelligence

Authors: Manjitsingh Rajput

Abstract:

Visual communication plays an important role in artificial intelligence (AI) because it enables machines to understand and interpret visual information, similar to how humans do. This abstract explores the importance of visual communication in AI and emphasizes the importance of various applications such as computer vision, object emphasis recognition, image classification and autonomous systems. In going deeper, with deep learning techniques and neural networks that modify visual understanding, In addition to AI programming, the abstract discusses challenges facing visual interfaces for AI, such as data scarcity, domain optimization, and interpretability. Visual communication and other approaches, such as natural language processing and speech recognition, have also been explored. Overall, this abstract highlights the critical role that visual communication plays in advancing AI capabilities and enabling machines to perceive and understand the world around them. The abstract also explores the integration of visual communication with other modalities like natural language processing and speech recognition, emphasizing the critical role of visual communication in AI capabilities. This methodology explores the importance of visual communication in AI development and implementation, highlighting its potential to enhance the effectiveness and accessibility of AI systems. It provides a comprehensive approach to integrating visual elements into AI systems, making them more user-friendly and efficient. In conclusion, Visual communication is crucial in AI systems for object recognition, facial analysis, and augmented reality, but challenges like data quality, interpretability, and ethics must be addressed. Visual communication enhances user experience, decision-making, accessibility, and collaboration. Developers can integrate visual elements for efficient and accessible AI systems.

Keywords: visual communication AI, computer vision, visual aid in communication, essence of visual communication.

Procedia PDF Downloads 78
13210 A Qualitative Assessment of the Internal Communication of the College of Comunication: Basis for a Strategic Communication Plan

Authors: Edna T. Bernabe, Joshua Bilolo, Sheila Mae Artillero, Catlicia Joy Caseda, Liezel Once, Donne Ynah Grace Quirante

Abstract:

Internal communication is significant for an organization to function to its full extent. A strategic communication plan builds an organization’s structure and makes it more systematic. Information is a vital part of communication inside the organization as this lays every possible outcome—be it positive or negative. It is, therefore, imperative to assess the communication structure of a particular organization to secure a better and harmonious communication environment in any organization. Thus, this research was intended to identify the internal communication channels used in Polytechnic University of the Philippines-College of Communication (PUP-COC) as an organization, to identify the flow of information specifically in downward, upward, and horizontal communication, to assess the accuracy, consistency, and timeliness of its internal communication channels; and to come up with a proposed strategic communication plan of information dissemination to improve the existing communication flow in the college. The researchers formulated a framework from Input-Throughout-Output-Feedback-Goal of General System Theory and gathered data to assess the PUP-COC’s internal communication. The communication model links the objectives of the study to know the internal organization of the college. The qualitative approach and case study as the tradition of inquiry were used to gather deeper understanding of the internal organizational communication in PUP-COC, using Interview, as the primary methods for the study. This was supported with a quantitative data which were gathered through survey from the students of the college. The researchers interviewed 17 participants: the College dean, the 4 chairpersons of the college departments, the 11 faculty members and staff, and the acting Student Council president. An interview guide and a standardized questionnaire were formulated as instruments to generate the data. After a thorough analysis of the study, it was found out that two-way communication flow exists in PUP-COC. The type of communication channel the internal stakeholders use varies as to whom a particular person is communicating with. The members of the PUP-COC community also use different types of communication channels depending on the flow of communication being used. Moreover, the most common types of internal communication are the letters and memoranda for downward communication, while letters, text messages, and interpersonal communication are often used in upward communication. Various forms of social media have been found out to be of use in horizontal communication. Accuracy, consistency, and timeliness play a significant role in information dissemination within the college. However, some problems have also been found out in the communication system. The most common problem are the delay in the dissemination of memoranda and letters and the uneven distribution of information and instruction to faculty, staff, and students. This has led the researchers to formulate a strategic communication plan which aims to propose strategies that will solve the communication problems that are being experienced by the internal stakeholders.

Keywords: communication plan, downward communication, internal communication, upward communication

Procedia PDF Downloads 501
13209 To Assess Variables Related to Self-Efficacy for Increasing Physical Activity in Advanced-Stage Cancer Patients

Authors: S. Nikpour, S. Vahidi, H. Haghani

Abstract:

Introduction: Exercise has mental and physical health benefits for patients with advanced stage cancer who actively receive chemotherapy, yet little is known about patients’ levels of interest in becoming more active or their confidence in increasing their activity level. Methods and materials: A convenience sample of 200 patients with advanced-stage cancer who were receiving chemotherapy completed self-report measures assessing physical activity level, mood, and quality-of-life variables. Qualitative data on patient-perceived benefits of, and barriers to, physical activity also were collected, coded by independent raters, and organized by predominant themes. Results: Current physical activity level, physical activity outcome expectations, and positive mood were significantly associated with self-efficacy. Fatigue was the most frequently listed barrier to physical activity; improved physical strength and health were the most commonly listed benefits. Participants identified benefits related to both general health and cancer-symptom management that were related to exercise. 59.5% of participants reported that they were seriously planning to increase or maintain their physical activity level, and over 40% reported having interest in receiving an intervention to become more active. Conclusion: These results suggested that many advanced-stage cancer patients who receive chemotherapy are interested in maintaining or increasing their physical activity level and in receiving professional support for exercise. In addition, these individuals identified general health and cancer-specific benefits of, and barriers to, physical activity. Future research will investigate how these findings may be incorporated into physical activity interventions for advanced-stage oncology patients receiving medical treatment.

Keywords: physical activity, cancer, self-efficacy

Procedia PDF Downloads 521