Search results for: computer security incident response team
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11234

Search results for: computer security incident response team

10454 Using Computer Simulations to Prepare Teachers

Authors: Roberta Gentry

Abstract:

The presentation will begin with a brief literature review of the use of computer simulation in teacher education programs. This information will be summarized. Additionally, based on the literature review, advantages and disadvantages of using computer simulation in higher education will be shared. Finally, a study in which computer simulations software was used with 50 initial licensure teacher candidates in both an introductory course and a behavior management course will be shared. Candidates reflected on their experiences with using computer simulation. The instructor of the course will also share lessons learned.

Keywords: simulations, teacher education, teacher preparation, educational research

Procedia PDF Downloads 644
10453 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance

Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz

Abstract:

The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.

Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor

Procedia PDF Downloads 57
10452 Indian Premier League (IPL) Score Prediction: Comparative Analysis of Machine Learning Models

Authors: Rohini Hariharan, Yazhini R, Bhamidipati Naga Shrikarti

Abstract:

In the realm of cricket, particularly within the context of the Indian Premier League (IPL), the ability to predict team scores accurately holds significant importance for both cricket enthusiasts and stakeholders alike. This paper presents a comprehensive study on IPL score prediction utilizing various machine learning algorithms, including Support Vector Machines (SVM), XGBoost, Multiple Regression, Linear Regression, K-nearest neighbors (KNN), and Random Forest. Through meticulous data preprocessing, feature engineering, and model selection, we aimed to develop a robust predictive framework capable of forecasting team scores with high precision. Our experimentation involved the analysis of historical IPL match data encompassing diverse match and player statistics. Leveraging this data, we employed state-of-the-art machine learning techniques to train and evaluate the performance of each model. Notably, Multiple Regression emerged as the top-performing algorithm, achieving an impressive accuracy of 77.19% and a precision of 54.05% (within a threshold of +/- 10 runs). This research contributes to the advancement of sports analytics by demonstrating the efficacy of machine learning in predicting IPL team scores. The findings underscore the potential of advanced predictive modeling techniques to provide valuable insights for cricket enthusiasts, team management, and betting agencies. Additionally, this study serves as a benchmark for future research endeavors aimed at enhancing the accuracy and interpretability of IPL score prediction models.

Keywords: indian premier league (IPL), cricket, score prediction, machine learning, support vector machines (SVM), xgboost, multiple regression, linear regression, k-nearest neighbors (KNN), random forest, sports analytics

Procedia PDF Downloads 34
10451 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 284
10450 Estimating Big Five Personality Expressions with a Tiered Information Framework

Authors: Laura Kahn, Paul Rodrigues, Onur Savas, Shannon Hahn

Abstract:

An empirical understanding of an individual's personality expression can have a profound impact on organizations seeking to strengthen team performance and improve employee retention. A team's personality composition can impact overall performance. Creating a tiered information framework that leverages proxies for a user's social context and lexical and linguistic content provides insight into location-specific personality expression. We leverage the layered framework to examine domain-specific, psychological, and lexical cues within social media posts. We apply DistilBERT natural language transfer learning models with real world data to examine the relationship between Big Five personality expressions of people in Science, Technology, Engineering and Math (STEM) fields.

Keywords: big five, personality expression, social media analysis, workforce development

Procedia PDF Downloads 133
10449 [Keynote Speech]: Bridge Damage Detection Using Frequency Response Function

Authors: Ahmed Noor Al-Qayyim

Abstract:

During the past decades, the bridge structures are considered very important portions of transportation networks, due to the fast urban sprawling. With the failure of bridges that under operating conditions lead to focus on updating the default bridge inspection methodology. The structures health monitoring (SHM) using the vibration response appeared as a promising method to evaluate the condition of structures. The rapid development in the sensors technology and the condition assessment techniques based on the vibration-based damage detection made the SHM an efficient and economical ways to assess the bridges. SHM is set to assess state and expects probable failures of designated bridges. In this paper, a presentation for Frequency Response function method that uses the captured vibration test information of structures to evaluate the structure condition. Furthermore, the main steps of the assessment of bridge using the vibration information are presented. The Frequency Response function method is applied to the experimental data of a full-scale bridge.

Keywords: bridge assessment, health monitoring, damage detection, frequency response function (FRF), signal processing, structure identification

Procedia PDF Downloads 335
10448 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria

Authors: Nuhu Bitrus Mailabari

Abstract:

Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.

Keywords: border, cross border, migration, Nigeria, northeast region, security

Procedia PDF Downloads 156
10447 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 426
10446 X-Bracing Configuration and Seismic Response

Authors: Saeed Rahjoo, Babak H. Mamaqani

Abstract:

Concentric bracing systems have been in practice for many years because of their effectiveness in reducing seismic response. Depending on concept, seismic design codes provide various response modification factors (R), which itself consists of different terms, for different types of lateral load bearing systems but configuration of these systems are often ignored in the proposed values. This study aims at considering the effect of different x-bracing diagonal configuration on values of ductility dependent term in R computation. 51 models were created and nonlinear push over analysis has been performed. The main variables of this study were the suitable location of X–bracing diagonal configurations, which establishes better nonlinear behavior in concentric braced steel frames. Results show that some x-bracing diagonal configurations improve the seismic performance of CBF significantly and explicit consideration of lateral load bearing systems seems necessary.

Keywords: bracing configuration, concentrically braced frame (CBF), push over analyses, response reduction factor

Procedia PDF Downloads 340
10445 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 327
10444 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 71
10443 Analysis of Unconditional Conservatism and Earnings Quality before and after the IFRS Adoption

Authors: Monica Santi, Evita Puspitasari

Abstract:

International Financial Reporting Standard (IFRS) has developed the principle based accounting standard. Based on this, IASB then eliminated the conservatism concept within accounting framework. Conservatism concept represents a prudent reaction to uncertainty to try to ensure that uncertainties and risk inherent in business situations are adequately considered. The conservatism concept has two ingredients: conditional conservatism or ex-post (news depending prudence) and unconditional conservatism or ex-ante (news-independent prudence). IFRS in substance disregards the unconditional conservatism because the unconditional conservatism can cause the understatement assets or overstated liabilities, and eventually the financial statement would be irrelevance since the information does not represent the real fact. Therefore, the IASB eliminate the conservatism concept. However, it does not decrease the practice of unconditional conservatism in the financial statement reporting. Therefore, we expected the earnings quality would be affected because of this situation, even though the IFRS implementation was expected to increase the earnings quality. The objective of this study was to provide empirical findings about the unconditional conservatism and the earnings quality before and after the IFRS adoption. The earnings per accrual measure were used as the proxy for the unconditional conservatism. If the earnings per accrual were negative (positive), it meant the company was classified as the conservative (not conservative). The earnings quality was defined as the ability of the earnings in reflecting the future earnings by considering the earnings persistence and stability. We used the earnings response coefficient (ERC) as the proxy for the earnings quality. ERC measured the extant of a security’s abnormal market return in response to the unexpected component of reporting earning of the firm issuing that security. The higher ERC indicated the higher earnings quality. The manufacturing companies listed in the Indonesian Stock Exchange (IDX) were used as the sample companies, and the 2009-2010 period was used to represent the condition before the IFRS adoption, and 2011-2013 was used to represent the condition after the IFRS adoption. Data was analyzed using the Mann-Whitney test and regression analysis. We used the firm size as the control variable with the consideration the firm size would affect the earnings quality of the company. This study had proved that the unconditional conservatism had not changed, either before and after the IFRS adoption period. However, we found the different findings for the earnings quality. The earnings quality had decreased after the IFRS adoption period. This empirical results implied that the earnings quality before the IFRS adoption was higher. This study also had found that the unconditional conservatism positively influenced the earnings quality insignificantly. The findings implied that the implementation of the IFRS had not decreased the unconditional conservatism practice and has not altered the earnings quality of the manufacturing company. Further, we found that the unconditional conservatism did not affect the earnings quality. Eventhough the empirical result shows that the unconditional conservatism gave positive influence to the earnings quality, but the influence was not significant. Thus, we concluded that the implementation of the IFRS did not increase the earnings quality.

Keywords: earnings quality, earnings response coefficient, IFRS Adoption, unconditional conservatism

Procedia PDF Downloads 249
10442 Incidence of Idiopathic Inflammatory Myopathies and Their Risk of Cancer in Leeds, UK: An 11-year Epidemiological Study

Authors: Benoit Jauniaux, Azzam Ismail

Abstract:

Objectives: The aims were to identify all incident adult cases of idiopathic inflammatory myopathies (IIMs) in the City of Leeds, UK, and to estimate the risk of cancer in IIMs as compared with the general population. Methods: Cases of IIMs were ascertained by review of all muscle biopsy reports from the Neuropathology Laboratory. A review of medical records was undertaken for each case to review the clinical diagnosis and collect epidemiological data such as age, ethnicity, sex, and comorbidities, including cancer. Leeds denominator population numbers were publicly obtainable. Results: Two hundred and six biopsy reports were identified, and after review, 50 incident cases were included in the study between June 2010 and January 2021. Out of the 50 cases, 27 were male, and 23 were female. The mean incidence rate of IIMs in Leeds throughout the study period was 7.42/1 000 000 person years. The proportion of IIMs cases with a confirmed malignancy was 22%. Compared to the general population, the relative risk of cancer was significantly greater in the IIMs population(31.56, P < 0.01). Conclusions: The incidence rate of IIMs in Leeds was consistent with data from previous literature, however, disagreement exists between different methods of IIMs case inclusion due to varying clinical criteria and definitions. IIMs are associated with increased risk of cancer however, the pathogenesis of this relationship still requires investigating. This study supports the practice of malignancy screening and long-term surveillance in patients with IIMs.

Keywords: idiopathic inflammatory myopathies, myositis, polymyositis, dermatomyositis, malignancy, epidemiology, incidence rate, relative risk

Procedia PDF Downloads 161
10441 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 275
10440 Nurses' Knowledge and Attitudes about Clinical Governance

Authors: Sedigheh Salemi, Mahnaz Sanjari, Maryam Aalaa, Mohammad Mirzabeigi

Abstract:

Clinical governance is the framework within which the health service provider is required to ongoing accountability and improvement of the quality of their services. This cross-sectional study was conducted in 661 nurses who work in government hospitals from 35 hospitals of 9 provinces in Iran. The study was approved by the Nursing Council and was carried out with the authorization of the Research Ethics Committee. The questionnaire included 24 questions in which 4 questions focused on clinical governance defining from the nurses' perspective. The reliability was evaluated by Cronbach's alpha (α=0/83). Statistical analyzes were performed, using SPSS version 16. Approximately 40% of nurses correctly answered that clinical governance is not "system of punishment and rewards for the staff". The most nurses believed that "clinical efficacy" is one of the main components of clinical governance. A few of nurses correctly responded that "Evidence Based Practice" and "management" is not part of clinical governance. The small number of nurses correctly answered that the "maintenance of patient records" and "to recognize the adverse effects" is not the role of nurse in clinical governance. Most "do not know" answer was to the "maintenance of patient records". The most nurses unanimously believed that the implementation of clinical governance led to "promoting the quality of care". About a third of nurses correctly stated that the implementation of clinical governance will not lead to "an increase in salaries and benefits of the medical team". As a member of the health team, nurses are responsible in terms of participation in quality improvement and it is necessary to create an environment in which clinical care will flourish and serve to preserve the high standards.

Keywords: clinical governance, nurses, salary, health team

Procedia PDF Downloads 421
10439 The Nurse Practitioner’s Role Functions in Multi-Specialist Team When Caring for a Metastatic Colon Cancer Patient with Acute Intestinal Obstruction

Authors: Yun-Tsuen Chen, Shih-Ting Huang, Pi-Fen Cheng, Yu-Ting Su, Joffrey Hsu, Hui-Zhu Chen

Abstract:

Acute intestinal obstruction is one of the differentials of acute abdomen and requires timely alleviation of intestinal distention and abdominal pain to avoid perforation, intra-abdominal infection, and peritonitis. Investigation to identify the cause of obstruction will direct treatment planning and allow for more effective management. In this study, we present a 71-year-old female presenting with symptoms of acute intestinal obstruction for five days. After extensive history taking, physical exam, medical imaging, and pathology, the patient was diagnosed with colon cancer with lung metastasis and acute intestinal obstruction. The patient was placed on nil per os status with intravenous fluid support, intravenous antibiotics, and a decompression nasogastric tube was placed. The patient received decompression with colostomy creation surgery. After assessing the patient’s clinical condition and tumor staging, a multidisciplinary healthcare team created an individualized treatment plan, which included plans to prepare the patient for home self-care and maintain good mental health with regular monitoring in the clinic setting. This case demonstrates the importance of early diagnosis, effective treatment, and a multidisciplinary approach to the management of acute intestinal obstruction secondary to colon cancer.

Keywords: acute intestinal obstruction, colostomy surgery, metastatic colon cancer, multidisciplinary healthcare team

Procedia PDF Downloads 105
10438 Ground Response Analyses in Budapest Based on Site Investigations and Laboratory Measurements

Authors: Zsolt Szilvágyi, Jakub Panuska, Orsolya Kegyes-Brassai, Ákos Wolf, Péter Tildy, Richard P. Ray

Abstract:

Near-surface loose sediments and local ground conditions in general have a major influence on seismic response of structures. It is a difficult task to model ground behavior in seismic soil-structure-foundation interaction problems, fully account for them in seismic design of structures, or even properly consider them in seismic hazard assessment. In this study, we focused on applying seismic soil investigation methods, used for determining soil stiffness and damping properties, to response analysis used in seismic design. A site in Budapest, Hungary was investigated using Multichannel Analysis of Surface Waves, Seismic Cone Penetration Tests, Bender Elements, Resonant Column and Torsional Shear tests. Our aim was to compare the results of the different test methods and use the resulting soil properties for 1D ground response analysis. Often in practice, there are little-to no data available on dynamic soil properties and estimated parameters are used for design. Therefore, a comparison is made between results based on estimated parameters and those based on detailed investigations. Ground response results are also compared to Eurocode 8 design spectra.

Keywords: MASW, resonant column test, SCPT, site response analysis, torsional shear test

Procedia PDF Downloads 395
10437 Development of a Diagnostic Device to Predict Clinically Significant Inflammation Associated with Cardiac Surgery

Authors: Mohamed Majrashi, Patricia Connolly, Terry Gourlay

Abstract:

Cardiopulmonary bypass is known to cause inflammatory response during open heart surgery. It includes the initiation of different cascades such as coagulation, complement system and cytokines. Although the immune system is body’s key defense mechanism against external assault, when overexpressed, it can be injurious to the patient, particularly in a cohort of patients in which there is a heightened and uncontrolled response. The inflammatory response develops in these patients to an exaggerated level resulting in an autoimmune injury and may lead to poor postoperative outcomes (systemic inflammatory response syndrome and multi-organs failure). Previous studies by this group have suggested a correlation between the level of IL6 measured in patient’s blood before surgery and after polymeric activation and the observed inflammatory response during surgery. Based upon these findings, the present work is aimed at using this response to develop a test which can be used prior to the open heart surgery to identify the high-risk patients before their operation. The work will be accomplished via three main clinical phases including some pilot in-vitro studies, device development and clinical investigation. Current findings from studies using animal blood, employing DEHP and DEHP plasticized PVC materials as the activator, support the earlier results in patient samples. Having established this relationship, ongoing work will focus on developing an activated lateral flow strip technology as a screening device for heightened inflammatory propensity.

Keywords: cardiopulmonary bypass, cytokines, inflammatory response, overexpression

Procedia PDF Downloads 276
10436 Effect of Cloud Computing on Enterprises

Authors: Amir Rashid

Abstract:

Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.

Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS

Procedia PDF Downloads 330
10435 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 635
10434 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 427
10433 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 351
10432 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 40
10431 Study of the Responding Time for Low Permeability Reservoirs

Authors: G. Lei, P. C. Dong, X. Q. Cen, S. Y. Mo

Abstract:

One of the most significant parameters, describing the effect of water flooding in porous media, is flood-response time, and it is an important index in oilfield development. The responding time in low permeability reservoir is usually calculated by the method of stable state successive substitution neglecting the effect of medium deformation. Numerous studies show that the media deformation has an important impact on the development for low permeability reservoirs and can not be neglected. On the base of streamline tube model, we developed a method to interpret responding time with medium deformation factor. The results show that: the media deformation factor, threshold pressure gradient and well spacing have a significant effect on the flood response time. The greater the media deformation factor, threshold pressure gradient or well spacing is, the lower the flood response time is. The responding time of different streamlines varies. As the angle with the main streamline increases, the water flooding response time delays as a "parabola" shape.

Keywords: low permeability, flood-response time, threshold pressure gradient, medium deformation

Procedia PDF Downloads 487
10430 Development of Interactional Competence: Listener Responses of Long-Term Stay Abroad Chinese L1 Speakers in Australian Universities

Authors: Wei Gao

Abstract:

The current study investigates the change of listener responses in social conversations of the second language (L2) speakers who are staying abroad with Chinese L1 speakers in Australian universities and how their long-term stay abroad impacted their design for L2 recipient actions. There is a limited amount of empirical work on L2 English listener response acquisition, particularly regarding the influence of long-term stay abroad in English-speaking countries. Little is known whether the development of L2 listener responses and the improvement of interactional competence is affected by the prolonged residency in the target L2 country. Forty-eight participants were recruited, and they participated in the designed speaking task through Computer-Mediated Communication. Results showed that long-term stay abroad Chinese L1 speakers demonstrated an English-like pattern of listener responses in communication. Long-term stay abroad experience had a significant impact on L2 English listener responses production and organization in social conversation. Long-term stay abroad L1 Chinese speakers had an active and productive response in listenership than their non-stay abroad counterparts in terms of frequency and placement in producing listener responses. However, the L2 English listener response production only occurred to be partial in response tokens, such as backchannels and reactive expressions, also in resumptive openers' employment. This study shows that L2 English listener responses could be acquired during a long-term stay abroad in English-speaking countries but showed partial acquisition in collaborative finishes production. In addition, the most prominent finding was that Chinese L1 speakers changed their overall listener responses pattern from L1 Chinese to L2 English. The study reveals specific interactional changes in English L2 listener responses acquisition. It generates pedagogical implications for cross-cultural communication and L2 pragmatics acquisition during a long-term stay abroad.

Keywords: listener responses, stay abroad, interactional competence, L2 pragmatics acquisition

Procedia PDF Downloads 78
10429 Influences of Separation of the Boundary Layer in the Reservoir Pressure in the Shock Tube

Authors: Bruno Coelho Lima, Joao F.A. Martos, Paulo G. P. Toro, Israel S. Rego

Abstract:

The shock tube is a ground-facility widely used in aerospace and aeronautics science and technology for studies on gas dynamic and chemical-physical processes in gases at high-temperature, explosions and dynamic calibration of pressure sensors. A shock tube in its simplest form is comprised of two separate tubes of equal cross-section by a diaphragm. The diaphragm function is to separate the two reservoirs at different pressures. The reservoir containing high pressure is called the Driver, the low pressure reservoir is called Driven. When the diaphragm is broken by pressure difference, a normal shock wave and non-stationary (named Incident Shock Wave) will be formed in the same place of diaphragm and will get around toward the closed end of Driven. When this shock wave reaches the closer end of the Driven section will be completely reflected. Now, the shock wave will interact with the boundary layer that was created by the induced flow by incident shock wave passage. The interaction between boundary layer and shock wave force the separation of the boundary layer. The aim of this paper is to make an analysis of influences of separation of the boundary layer in the reservoir pressure in the shock tube. A comparison among CDF (Computational Fluids Dynamics), experiments test and analytical analysis were performed. For the analytical analysis, some routines in Python was created, in the numerical simulations (Computational Fluids Dynamics) was used the Ansys Fluent, and the experimental tests were used T1 shock tube located in IEAv (Institute of Advanced Studies).

Keywords: boundary layer separation, moving shock wave, shock tube, transient simulation

Procedia PDF Downloads 307
10428 Optimizing Usability Testing with Collaborative Method in an E-Commerce Ecosystem

Authors: Markandeya Kunchi

Abstract:

Usability testing (UT) is one of the vital steps in the User-centred design (UCD) process when designing a product. In an e-commerce ecosystem, UT becomes primary as new products, features, and services are launched very frequently. And, there are losses attached to the company if an unusable and inefficient product is put out to market and is rejected by customers. This paper tries to answer why UT is important in the product life-cycle of an E-commerce ecosystem. Secondary user research was conducted to find out work patterns, development methods, type of stakeholders, and technology constraints, etc. of a typical E-commerce company. Qualitative user interviews were conducted with product managers and designers to find out the structure, project planning, product management method and role of the design team in a mid-level company. The paper tries to address the usual apprehensions of the company to inculcate UT within the team. As well, it stresses upon factors like monetary resources, lack of usability expert, narrow timelines, and lack of understanding of higher management as some primary reasons. Outsourcing UT to vendors is also very prevalent with mid-level e-commerce companies, but it has its own severe repercussions like very little team involvement, huge cost, misinterpretation of the findings, elongated timelines, and lack of empathy towards the customer, etc. The shortfalls of the unavailability of a UT process in place within the team and conducting UT through vendors are bad user experiences for customers while interacting with the product, badly designed products which are neither useful and nor utilitarian. As a result, companies see dipping conversions rates in apps and websites, huge bounce rates and increased uninstall rates. Thus, there was a need for a more lean UT system in place which could solve all these issues for the company. This paper highlights on optimizing the UT process with a collaborative method. The degree of optimization and structure of collaborative method is the highlight of this paper. Collaborative method of UT is one in which the centralised design team of the company takes for conducting and analysing the UT. The UT is usually a formative kind where designers take findings into account and uses in the ideation process. The success of collaborative method of UT is due to its ability to sync with the product management method employed by the company or team. The collaborative methods focus on engaging various teams (design, marketing, product, administration, IT, etc.) each with its own defined roles and responsibility in conducting a smooth UT with users In-house. The paper finally highlights the positive results of collaborative UT method after conducting more than 100 In-lab interviews with users across the different lines of businesses. Some of which are the improvement of interaction between stakeholders and the design team, empathy towards users, improved design iteration, better sanity check of design solutions, optimization of time and money, effective and efficient design solution. The future scope of collaborative UT is to make this method leaner, by reducing the number of days to complete the entire project starting from planning between teams to publishing the UT report.

Keywords: collaborative method, e-commerce, product management method, usability testing

Procedia PDF Downloads 108
10427 The Impacts of an Adapted Literature Circle Model on Reading Comprehension, Engagement, and Cooperation in an EFL Reading Course

Authors: Tiantian Feng

Abstract:

There is a dearth of research on the literary circle as a teaching strategy in English as a Foreign Language (EFL) classes in Chinese colleges and universities and even fewer empirical studies on its impacts. In this one-quarter, design-based project, the researcher aims to increase students’ engagement, cooperation, and, on top of that, reading comprehension performance by utilizing a researcher-developed, adapted reading circle model in an EFL reading course at a Chinese college. The model also integrated team-based learning and portfolio assessment, with an emphasis on the specialization of individual responsibilities, contributions, and outcomes in reading projects, with the goal of addressing current issues in EFL classes at Chinese colleges, such as passive learning, test orientation, ineffective and uncooperative teamwork, and lack of dynamics. In this quasi-experimental research, two groups of students enrolled in the course were invited to participate in four in-class team projects, with the intervention class following the adapted literature circle model and team members rotating as Leader, Coordinator, Brain trust, and Reporter. The researcher/instructor used a sequential explanatory mixed-methods approach to quantitatively analyze the final grades for the pre-and post-tests, as well as individual scores for team projects and will code students' artifacts in the next step, with the results to be reported in a subsequent paper(s). Initial analysis showed that both groups saw an increase in final grades, but the intervention group enjoyed a more significant boost, suggesting that the adapted reading circle model is effective in improving students’ reading comprehension performance. This research not only closes the empirical research gap of literature circles in college EFL classes in China but also adds to the pool of effective ways to optimize reading comprehension performance and class performance in college EFL classes.

Keywords: literature circle, EFL teaching, college english reading, reading comprehension

Procedia PDF Downloads 89
10426 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 62
10425 From the Local to the Global: New Terrorism

Authors: Shamila Ahmed

Abstract:

The paper examines how the fluidity between the local level and the global level is an intrinsic feature of new terrorism. Through using cosmopolitanism, the narratives of the two opposing sides of ISIS and the ‘war on terrorism’ response are explored. It is demonstrated how the fluidity between these levels facilitates the radicalisation process through exploring how groups such as ISIS highlight the perceived injustices against Muslims locally and globally and therefore exploit the globalisation process which has reduced the space between these levels. Similarly, it is argued that the ‘war on terror’ involves the intersection of fear, security, threat, risk and social control as features of both the international ‘war on terror’ and intra state policies.

Keywords: terrorism, war on terror, cosmopolitanism, global level terrorism

Procedia PDF Downloads 574