Search results for: school security
5042 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4275041 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare
Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon
Abstract:
This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty
Procedia PDF Downloads 3515040 Family Support in Combating Extreme Stress: The Experience of Entrance Examinations Candidates in Greek Universities
Authors: Marianna De Almeida
Abstract:
Greek secondary education is a highly selective system with regard to the access of students to Greek universities. Since access from elementary to lower secondary education and afterward to upper secondary education is rather liberal and almost free of selective mechanisms, the basic selection process comes after graduating from upper secondary school into play when students go through a highly selective process for university entry. This structure is responsible for the experience of extreme stress on the part of the candidates during a period of at least two years before the entrance examination leading to a radical change in students' everyday life routines. Instead of the school being an important agent for academic and psychological support, it seems that other agents, such as the informal private preparatory school and the student's families, take on the supportive role.Keywords: stress, entrance examinations, family support, secondary education
Procedia PDF Downloads 605039 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 405038 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 1325037 The Effects of the Parent Training Program for Obesity Reduction on Health Behaviors of School-Age Children
Authors: Muntanavadee Maytapattana
Abstract:
The purposes of the study were to evaluate the effectiveness of the Parent Training Program for Obesity Reduction (PTPOR) on health behaviors of school-age children. An Ecological Systems Theory (EST) was approached the study and a randomized control trial was used in this study. Participants were school-age overweight or obese children and their parents. One hundred and one parent-child dyads were recruited and random assigned into the PTPOR (N=30), Educational Intervention or EI (N=32), and control group (N=39). The parents in the PTPOR group participated in five sessions including an educational session, a cooking session, aerobic exercise training, 2-time group discussion sessions, and 4-time telephoned counseling sessions. Repeated Measure ANCOVA was used to analyze data. The results presented that the outcomes of the PTPOR group were better than the EI and the control groups at 1st, 8th, and 32nd weeks after finishing the program such as child exercise behavior (F(2,97) = 3.98, p = .02) and child dietary behavior (F(2,97) = 9.42, p = .00). The results suggest that nurses and health care providers should utilize the PTPOR for child weight reduction and for the health promotion of a lifestyle among overweight and obese children.Keywords: parent training program, obesity reduction, child health behaviors, school-age children
Procedia PDF Downloads 4355036 Parental Investment in Education: A Pathway for the Children's Access to Quality Education
Authors: Tukur Husaini Nahuche
Abstract:
The parent resources play a vital role in the life of the offspring. It help give children basic necessities of life like food, clothing, and housing. In a like manner financial assets allow parents to move into neighborhood with more affluent school systems, to pay school bills, purchase expensive technologies like personal computer, save money for tutoring books, magazines, journals, Newspapers etc. Making of proper provision in the home environment conducive for learning after school hours and creation of other outdoor activities for them are what necessitate in enhancing and accelerating children’s learning opportunities. Indeed, this paper intends to discuss parental investment in education, parent income resources, parental education, occupation, and income as relatively influencing children’s access to quality education. With the hope that families would provide equal opportunities for children irrespective of their sex, intelligence, subject choice,etc.Keywords: parental investment, children's access, quality education
Procedia PDF Downloads 5445035 Public-Private Partnership for Community Empowerment and Sustainability: Exploring Save the Children’s 'School Me' Project in West Africa
Authors: Gae Hee Song
Abstract:
This paper aims to address the evolution of public-private partnerships for mainstreaming an evaluation approach in the community-based education project. It examines the distinctive features of Save the Children’s School Me project in terms of empowerment evaluation principles introduced by David M. Fetterman, especially community ownership, capacity building, and organizational learning. School Me is a Save the Children Korea funded-project, having been implemented in Cote d’Ivoire and Sierra Leone since 2016. The objective of this project is to reduce gender-based disparities in school completion and learning outcomes by creating an empowering learning environment for girls and boys. Both quasi-experimental and experimental methods for impact evaluation have been used to explore changes in learning outcomes, gender attitudes, and learning environments. To locate School Me in the public-private partnership framework for community empowerment and sustainability, the data have been collected from School Me progress/final reports, baseline, and endline reports, fieldwork observations, inter-rater reliability of baseline and endline data collected from a total of 75 schools in Cote d’Ivoire and Sierra Leone. The findings of this study show that School Me project has a significant evaluation component, including qualitative exploratory research, participatory monitoring, and impact evaluation. It strongly encourages key actors, girls, boys, parents, teachers, community leaders, and local education authorities, to participate in the collection and interpretation of data. For example, 45 community volunteers collected baseline data in Cote d’Ivoire; on the other hand, three local government officers and fourteen enumerators participated in the follow-up data collection of Sierra Leone. Not only does this public-private partnership improve local government and community members’ knowledge and skills of monitoring and evaluation, but the evaluative findings also help them find their own problems and solutions with a strong sense of community ownership. Such community empowerment enables Save the Children country offices and member offices to gain invaluable experiences and lessons learned. As a result, empowerment evaluation leads to community-oriented governance and the sustainability of the School Me project.Keywords: community empowerment, Cote d’Ivoire, empowerment evaluation, public-private partnership, save the children, school me, Sierra Leone, sustainability
Procedia PDF Downloads 1175034 Water Education in the Middle East: Case Study of Iran and Turkey
Authors: Seyedeh Zahra Seyed Sharifi, M. R. M. Tabatabaei
Abstract:
Due to increase of population and healthy food demand, management and conservation of water resources have become one of the main concerns of governments, scientists and economists. In recent years, Iran has exposed to water scarcity as a result of which its rivers, lakes and wetlands have dried up or are in the drying process. Therefore, water crisis has become the most important environmental issue in the country. Under these circumstances, increasing public awareness by promoting their culture as well as public collaboration to protect water resources could only be possible by making courses to reflect water importance. This could be approached by school and high-school students to learn optimum use of water resources. This study initially focuses on the current position of water courses in levels of school and high-school educations in Iran and Turkey and then deals with the challenges to be faced for the promotion of the system. The course titles and number of pages related to water in all primary and secondary textbooks of the education system of Iran and Turkey were determined using content analysis method and the results were presented. The results indicate that primary and secondary textbooks in both countries must focus on water shortage and water protection and teach children the optimum use of water in order to promote water protection.Keywords: educational system, environmental awareness, Iran, Turkey, water crisis
Procedia PDF Downloads 2945033 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm
Authors: Vahid Bayrami Rad
Abstract:
Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.Keywords: arduino board, artificial intelligence, image processing, solenoid lock
Procedia PDF Downloads 625032 Improving the Teaching and Learning of Basic Mathematics: An Imperative for Sustainable Development
Authors: Dahiru Bawa Muhammad
Abstract:
Mathematics is accorded a prime position in basic education curriculum because it is envisaged to be an important tool in preparing children for life after school as well as equipping them with skills needed for secondary and higher education. As a result of this, the subject is made compulsory from primary through secondary school and candidates are expected to offer it and pass before fulfilling the requirement for higher education. Against this backdrop, this paper overviewed the basic education programme, context of teaching and learning mathematics at basic education level in Katsina State of Nigeria, relevance of the subject to different fields of human endeavours, challenges threatening the utility of the subject as a tool for the achievement of the goals of basic education programme and concluded by recommending how teaching and learning of mathematics can be improved for even development of citizens within nation states and enhanced/mutual sustainable development of nations in the global village.Keywords: basic education, junior secondary school education, mathematical centre
Procedia PDF Downloads 4505031 Securing Web Servers by the Intrusion Detection System (IDS)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).Keywords: intrusion detection, architectures, characteristic, tools, security, web server
Procedia PDF Downloads 4085030 Computer-Based versus Paper-Based Tests: A Comparative Study of Two Types of Indonesian National Examination for Senior High School Students
Authors: Faizal Mansyur
Abstract:
The objective of this research is to find out whether there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based tests. The population of this research is senior high school students in South Sulawesi Province who sat the Indonesian National Examination for 2015/2016 academic year. The samples of this research are 800 students’ scores from 8 schools taken by employing the multistage random sampling technique. The data of this research is a secondary data since it is obtained from the education office for South Sulawesi. In analyzing the collected data, the researcher employed the independent samples T-Test with the help of SPSS v.24 program. The finding of this research reveals that there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based Tests (p < .05). Moreover, students tested by using PBT (Mean = 63.13, SD = 13.63) achieve higher score than those tested by using CBT (Mean = 46.33, SD = 14.68).Keywords: computer-based test, paper-based test, Indonesian national examination, testing
Procedia PDF Downloads 1605029 Learning from Inclusive Education of Exceptional and Normal Children in Primary School for Architectural Design
Authors: T. Pastraporn, J. Panida, P. Gasamapong, N. Jintana
Abstract:
The study of inclusive educational environment of exceptional and normal children at the regional centre for special education aimed to establish guidelines for creating an environment for inclusive education. Buildings utilization of thirty-five elementary schools providing inclusive educational program in Bangkok were analyzed to study the following aspects: 1) The environment of exceptional and normal students’ inclusive classes at the regional centre for special education 2) The patterns of the environment suited to the exceptional and normal students’ inclusive classes 3) Environmental management policies for the inclusive classes of exceptional and normal students. Information was gathered from surveys, observations, questionnaires, document analysis, interviews, and non-experimental research. The findings showed that the usable spaces in school buildings were designated to enhance the three kinds of social learning experience: 1) Support class control 2) Help developing students’ personality consisting of physical, verbal and emotional expressions that are socially accepted 3) Recognition and learning, which are needed for the increasing of learning experience, were caused by having an interaction with the environment. Thus, the school buildings’ space designation positively affected the environmental management of exceptional and normal students’ inclusive classes.Keywords: learning environment, inclusive education, school buildings, exceptional and normal children
Procedia PDF Downloads 3215028 The Multi-Lingual Acquisition Patterns of Elementary, High School and College Students in Angeles City, Philippines
Authors: Dennis Infante, Leonora Yambao
Abstract:
The Philippines is a multilingual community. A Filipino learns at least three languages throughout his lifespan. Since languages are learned and picked up simultaneously in the environment, a student naturally develops a language system that combines features of at least three languages: the local language, English and Filipino. This study seeks to investigate this particular phenomenon and aspires to propose a theoretical framework of unique language acquisition in the elementary, high school and college in the three languages spoken and used in media, community, business and school: Kapampangan, the local language; Filipino, the national language; and English. The study randomly selects five students from three participating schools in order to acquire language samples. The samples were analyzed in the subsentential, sentential and suprasentential levels using grammatical theories. The data are classified to map out the pattern of substitution or shifting from one language to another.Keywords: language acquisition, mother tongue, multiculturalism, multilingual education
Procedia PDF Downloads 3695027 An Exploration of Architecture Design Methods in Urban Fringe Belt Based on Typo-Morphological Research- A Case of Expansion Project of the Second Middle School in Xuancheng, China
Authors: Dong Yinan, Zhou Zijie
Abstract:
Urban fringe belt is an important part of urban morphology research. Different from the relatively fixed central district of city, the position of fringe belt is changing. In the process of urban expansion, the original fringe belt is likely to be merged by the new-built city, even become new city public center. During the change, we are facing the dialectic between restoring the organicity of old urban form and creating new urban image. There are lots of relevant research in urban scale, but when we focus on building scale, rare design method can be proposed, thus some new individual building cannot match the overall urban planning intent. The expansion project of the second middle school in Xuancheng is facing this situation. The existing campus is located in the south fringe belt of Xuancheng, Anhui province, China, adjacent to farmland and ponds. While based on the Xucheng urban planning, the farmland and ponds will be transformed into a big lake, around which new public center will be built; the expansion of the school becomes an important part of the boundary of the new public center. Therefore, the expansion project faces challenges from both urban and building scale. In urban scale, we analyze and summarize the fringe belt characters through the reading of existing and future urban organism, in order to determine the form of the expansion project. Meanwhile, in building scale, we study on different types of school buildings and select appropriate type which can satisfy to both urban form and school function. This research attempts to investigate design methods based on an under construction project in Xuancheng, a historic city in southeast China. It also aims to bridge the gap from urban design to individual building design through the typo-morphological research.Keywords: design methods, urban fringe belt, typo-morphological research, middle school
Procedia PDF Downloads 4915026 Disconnect between Water, Sanitation and Hygiene Related Behaviours of Children in School and Family
Authors: Rehan Mohammad
Abstract:
Background: Improved Water, Sanitation and Hygiene (WASH) practices in schools ensure children’s health, well-being and cognitive performance. In India under various WASH interventions in schools, teachers, and other staff make every possible effort to educate children about personal hygiene, sanitation practices and harms of open defecation. However, once children get back to their families, they see other practicing inappropriate WASH behaviors, and they consequently start following them. This show disconnect between school behavior and family behavior, which needs to be bridged to achieve desired WASH outcomes. Aims and Objectives: The aim of this study is to assess the factors causing disconnect of WASH-related behaviors between school and the family of children. It also suggests behavior change interventions to bridge the gap. Methodology: The present study has chosen a mixed- method approach. Both quantitative and qualitative methods of data collection have been used in the present study. The purposive sampling for data collection has been chosen. The data have been collected from 20% children in each age group of 04-08 years and 09-12 years spread over three primary schools and 20% of households to which they belong to which is spread over three slum communities in south district of Delhi. Results: The present study shows that despite of several behavior change interventions at school level, children still practice inappropriate WASH behaviors due to disconnect between school and family behaviors. These behaviors show variation from one age group to another. The inappropriate WASH behaviors being practiced by children include open defecation, wrong disposal of garbage, not keeping personal hygiene, not practicing hand washing practices during critical junctures and not washing fruits and vegetables before eating. The present study has highlighted that 80% of children in the age group of 04-08 years still practice inappropriate WASH behaviors when they go back to their families after school whereas, this percentage has reduced to 40% in case of children in the age group 09-12 years. Present study uncovers association between school and family teaching which creates a huge gap between WASH-related behavioral practices. The study has established that children learn and de-learn the WASH behaviors due to the evident disconnect between behavior change interventions at schools and household level. The study has also made it clear that children understand the significance of appropriate WASH practices but owing to the disconnect the behaviors remain unsettled. The study proposes several behavior change interventions to sync the behaviors of children at school and family level to ensure children’s health, well-being and cognitive performance.Keywords: behavioral interventions, child health, family behavior, school behavior, WASH
Procedia PDF Downloads 1025025 Effects of Music Training on Social-Emotional Development and Basic Musical Skills: Findings from a Longitudinal Study with German and Migrant Children
Authors: Stefana Francisca Lupu, Jasmin Chantah, Mara Krone, Ingo Roden, Stephan Bongard, Gunter Kreutz
Abstract:
Long-term music interventions could enhance both musical and nonmusical skills. The present study was designed to explore cognitive, socio-emotional, and musical development in a longitudinal setting. Third-graders (N = 184: 87 male, 97 female; mean age = 8.61 years; 115 native German and 69 migrant children) were randomly assigned to two intervention groups (music and maths) and a control group over a period of one school-year. At baseline, children in these groups were similar in basic cognitive skills, with a trend of advantage in the control group. Dependent measures included the culture fair intelligence test CFT 20-R; the questionnaire of emotional and social school experience for grade 3 and 4 (FEESS 3-4), the test of resources in childhood and adolescence (FRKJ 8-16), the test of language proficiency for German native and non-native primary school children (SFD 3), the reading comprehension test (ELFE 1-6), the German math test (DEMAT 3+) and the intermediate measures of music audiation (IMMA). Data were collected two times at the beginning (T1) and at the end of the school year (T2). A third measurement (T3) followed after a six months retention period. Data from baseline and post-intervention measurements are currently being analyzed. Preliminary results of all three measurements will be presented at the conference.Keywords: musical training, primary-school German and migrant children, socio-emotional skills, transfer
Procedia PDF Downloads 2355024 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4875023 Preserving Privacy in Workflow Delegation Models
Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi
Abstract:
The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance
Procedia PDF Downloads 3255022 Data and Biological Sharing Platforms in Community Health Programs: Partnership with Rural Clinical School, University of New South Wales and Public Health Foundation of India
Authors: Vivian Isaac, A. T. Joteeshwaran, Craig McLachlan
Abstract:
The University of New South Wales (UNSW) Rural Clinical School has a strategic collaborative focus on chronic disease and public health. Our objectives are to understand rural environmental and biological interactions in vulnerable community populations. The UNSW Rural Clinical School translational model is a spoke and hub network. This spoke and hub model connects rural data and biological specimens with city based collaborative public health research networks. Similar spoke and hub models are prevalent across research centers in India. The Australia-India Council grant was awarded so we could establish sustainable public health and community research collaborations. As part of the collaborative network we are developing strategies around data and biological sharing platforms between Indian Institute of Public Health, Public Health Foundation of India (PHFI), Hyderabad and Rural Clinical School UNSW. The key objective is to understand how research collaborations are conducted in India and also how data can shared and tracked with external collaborators such as ourselves. A framework to improve data sharing for research collaborations, including DNA was proposed as a project outcome. The complexities of sharing biological data has been investigated via a visit to India. A flagship sustainable project between Rural Clinical School UNSW and PHFI would illustrate a model of data sharing platforms.Keywords: data sharing, collaboration, public health research, chronic disease
Procedia PDF Downloads 4415021 Implementation of Achterbahn-128 for Images Encryption and Decryption
Authors: Aissa Belmeguenai, Khaled Mansouri
Abstract:
In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.Keywords: Achterbahn-128, stream cipher, image encryption, security analysis
Procedia PDF Downloads 5215020 The Role of Student Culture in Beginning Music Teachers’ Instruction in Urban School Settings
Authors: Kiana Williams
Abstract:
The purpose of this case study was to examine beginning music teachers’ perspectives of cultural relevance in relation to music instruction in urban school settings within a large Southwestern city. Research questions focused on the role of student culture in beginning music teachers’ instruction. Data were collected based on Seidman’s (2013) three interview series, consisting of audio recordings from two semi-structured individual interviews for each participant, a 15-20-minute video recording from each participant teaching in their classroom, and an audio recording of one focus group interview. Participants included three beginning music teachers currently employed in urban schools in a major metropolitan city in the Southern United States. In this study, a teacher was considered a beginning teacher if they had zero to three years of experience teaching music in urban school settings. The results revealed three broad themes related to connectivity and relatability, concerts, and differentiated instruction. Implications for current music educators as well as music teacher educators in higher education are included in this study. Further research should consider examining the effect of culturally relevant pedagogy on student retention in urban school music programs.Keywords: culture, instruction, music, pedagogy, teacher, urban
Procedia PDF Downloads 1315019 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya
Authors: Samuel Mwangi, Josephine K. Mule
Abstract:
Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.Keywords: facial recognition, access control, technology, learning
Procedia PDF Downloads 1175018 Water Security and Transboundary Issues for Food Security of Ethiopia. The Case of Nile River
Authors: Kebron Asnake
Abstract:
Water security and transboundary issues are critical concerns for countries, particularly in regions where shared water resources are significant. This Research focuses on exploring the challenges and opportunities related to water security and transboundary issues in Ethiopia, using the case of the Nile River. Ethiopia, as a riparian country of the Nile River, faces complex water security issues due to its dependence on this transboundary water resource. This abstract aims to analyze the various factors that affect water security in Ethiopia, including population growth, climate change, and competing water demands. The Study examines the challenges linked to transboundary water management of the Nile River. It delves into the complexities of negotiating water allocations and addressing potential conflicts among the downstream riparian countries. The paper also discusses the role of international agreements and cooperation in promoting sustainable water resource management. Additionally, the paper highlights the opportunities for collaboration and sustainable development that arise from transboundary water management. It explores the potential for joint investments in water infrastructure, hydropower generation, and irrigation systems that can contribute to regional economic growth and water security. Furthermore, the study emphasizes the need for integrated water management approaches in Ethiopia to ensure the equitable and sustainable use of the Nile River's waters. It highlights the importance of involving stakeholders from diverse sectors, including agriculture, energy, and environmental conservation, in decision-making processes. By presenting the case of the Nile River in Ethiopia, this Abstract contributes to the understanding of water security and transboundary issues. It underscores the significance of regional cooperation and informed policy-making to address the challenges and opportunities presented by transboundary water resources. The paper serves as a foundation for further research and policy in water management in Ethiopia and other regions facing similar challenges.Keywords: water, health, agriculture, medicine
Procedia PDF Downloads 685017 The Education Quality Management by the Participation of the Community in Northern Part of Thailand
Authors: Preecha Pongpeng
Abstract:
This research aims to study the education quality management to solve the problem of teachers shortage by the communities participation. This research is action research by using the tools is questionnaire to collect the data whit, students and community representatives and final will interview to ask the opinions of people in the community to help and support instruction in problems in teaching. Results found that people in the community are aware and working together to solve the lack the of teachers by collaboration between school personnel and community members by finding people who are knowledgeable, organized into local wisdom in the community, compound money to donate and hire someone in the community to teaching between classroom with people in the community. In addition, researcher discovered this research project contributes to cooperation between the school and community and there was a problem including administrative expenses and the school's academic quality management.Keywords: education quality management, local wisdom, northern part of Thailand, participation of the community
Procedia PDF Downloads 2805016 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa
Authors: Victor O. Abegunde, Melusi Sibanda
Abstract:
There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.Keywords: climate change, climate-smart agriculture, food security, small-scale
Procedia PDF Downloads 2295015 An Evaluation of the Efficacy of School-Based Suicide Prevention Programs
Authors: S. Wietrzychowski
Abstract:
The following review has identified specific programs, as well as the elements of these programs, that have been shown to be most effective in preventing suicide in schools. Suicide is an issue that affects many students each year. Although this is a prominent issue, there are few prevention programs used within schools. The primary objective of most prevention programs is to reduce risk factors such as depression and hopelessness, and increase protective factors like support systems and help-seeking behaviors. Most programs include a gatekeeper training model, education component, peer support group, and/or counseling/treatment. Research shows that some of these programs, like the Signs of Suicide and Youth Aware of Mental Health Programme, are effective in reducing suicide behaviors and increasing protective factors. These programs have been implemented in many countries across the world and have shown promising results. Since schools can provide easy access to adolescents, implement education programs, and train staff members and students how to identify and to report suicide behaviors, school-based programs seem to be the best way to prevent suicide among adolescents. Early intervention may be an effective way to prevent suicide. Although, since early intervention is not always an option, school-based programs in high schools have also been shown to decrease suicide attempts by up to 50%. As a result of this presentation, participants will be able to 1.) list at least 2 evidence-based suicide prevention programs, 2.) identify at least 3 factors which protect against suicide, and 3.) describe at least 3 risk factors for suicide.Keywords: school, suicide, prevention, programs
Procedia PDF Downloads 3345014 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System
Authors: Mobarok Hossain Bhuyain
Abstract:
Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.Keywords: human detection, target tracking, neural network, particle filter
Procedia PDF Downloads 1555013 Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Abstract:
Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.Keywords: SIM card, mobile financial services, cryptography, secure data storage
Procedia PDF Downloads 300