Search results for: smart security
3175 Some Issues with Extension of an HPC Cluster
Authors: Pil Seong Park
Abstract:
Homemade HPC clusters are widely used in many small labs, because they are easy to build and cost-effective. Even though incremental growth is an advantage of clusters, it results in heterogeneous systems anyhow. Instead of adding new nodes to the cluster, we can extend clusters to include some other Internet servers working independently on the same LAN, so that we can make use of their idle times, especially during the night. However extension across a firewall raises some security problems with NFS. In this paper, we propose a method to solve such a problem using SSH tunneling, and suggest a modified structure of the cluster that implements it.Keywords: extension of HPC clusters, security, NFS, SSH tunneling
Procedia PDF Downloads 4243174 Rooftop Rainwater Harvesting for Sustainable Organic Farming: Insights from Smart cities in India
Authors: Rajkumar Ghosh
Abstract:
India faces a critical task of water shortage, specifically during dry seasons, which adversely impacts agricultural productivity and food protection. Natural farming, specializing in sustainable practices, demands green water management in smart cities in India. This paper examines how rooftop rainwater harvesting (RRWH) can alleviate water scarcity and support sustainable organic farming practices in India. RRWH emerges as a promising way to increase water availability for the duration of dry intervals and decrease reliance on traditional water sources in smart cities. The look at explores the capacity of RRWH to enhance water use performance, help crop growth, enhance soil health, and promote ecological stability inside the farming ecosystem. The medical paper delves into the advantages, challenges, and implementation techniques of RRWH in organic farming. It addresses demanding situations, including seasonal variability of rainfall, limited rooftop vicinity, and monetary concerns. Moreover, it analyses broader environmental and socio-economic implications of RRWH for sustainable agriculture, emphasizing water conservation, biodiversity protection, and the social properly-being of farming communities. The belief underscores the importance of RRWH as a sustainable solution for reaching the aim of sustainable agriculture in natural farming in India. It emphasizes the want for further studies, policy advocacy, and capacity-building initiatives to promote RRWH adoption and assist the transformation in the direction of sustainable organic farming systems. The paper proposes adaptive strategies to triumph over demanding situations and optimize the advantages of RRWH in organic farming. By way of doing so, India can make vast development in addressing water scarcity issues and making sure a greater resilient and sustainable agricultural future in smart cities.Keywords: rooftop rainwater harvesting, organic farming, green water management, food protection, ecological stabilty
Procedia PDF Downloads 1003173 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)
Authors: Syed Sibtain Hussain Shah
Abstract:
The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat
Procedia PDF Downloads 1393172 Approaches to Ethical Hacking: A Conceptual Framework for Research
Authors: Lauren Provost
Abstract:
The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.Keywords: ethical hacking, literature review, penetration testing, social engineering
Procedia PDF Downloads 2173171 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal
Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube
Abstract:
The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS
Procedia PDF Downloads 523170 Automatic Teller Machine System Security by Using Mobile SMS Code
Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem
Abstract:
The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition
Procedia PDF Downloads 3613169 Assessing the Role of Water Research and Development Investment towards Water Security in South Africa: During the Five Years Period (2009/10 - 2013/14)
Authors: Hlamulo Makelane
Abstract:
The study aims at providing new insights regarding research and development (R&D) public and private activities based on the national R&D survey of the past five years. The main question of the study is what role does water R&D plays on water security; to then analyze what lessons could be extracted to improve the security of water through R&D. In particular, this work concentrates on three main aspects of R&D investments: (i) the level of expenditures, (ii) the sources of funding related to water R&D, and (iii) the personnel working in the field, both for the public and private sectors. The nonlinear regression approached will be used for data analysis based on secondary data gathered from the South African nation R&D survey conducted annually by the Centre for science, technology and innovation indicators (CeSTII).Keywords: water, R&D, investment, public sector, private sector
Procedia PDF Downloads 2363168 Multi-Agent TeleRobotic Security Control System: Requirements Definitions of Multi-Agent System Using The Behavioral Patterns Analysis (BPA) Approach
Authors: Assem El-Ansary
Abstract:
This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Multi-Agent TeleRobotic Security Control System (MTSCS). The event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are the Behavioral Pattern Analysis (BPA) modeling methodology, and the development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.Keywords: analysis, multi-agent, TeleRobotics control, security, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases
Procedia PDF Downloads 4373167 Central American Security Issue: Civil Wars Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, violence
Procedia PDF Downloads 3933166 Insurance of Agricultural Activities as the Basis for Food Security
Authors: J. B. Akshataeva, G. T. Aigarinova, A. Amankulova, D. S. Kalkanova
Abstract:
This article examines some aspects of the insurance of agricultural activities, strategic documents on deepening investment opportunities. Insurance market development is before the society and the state. It also examines problems of agricultural insurance development in the market economy of Kazakhstan as the basis for food security.Keywords: agriculture, food safety, insurance, privacy issues
Procedia PDF Downloads 5013165 Weapon Collection Initiatives and the Threat of Small Arms and Light Weapons Proliferation in Volatile Areas of North-Eastern Nigeria as a Way Forward for National Security and Development
Authors: Halilu Babaji, Adamu Buba
Abstract:
The proliferation of small arms and light weapons (SALW) and its illicit trafficking in West Africa and Nigeria in particular, pose a major threat to peace, security and development in the Sub-region. The high circulation of these weapons in the region is a product of the interplay of several factors, which derives principally from the internal socio-economic and political dynamics compounded by globalization. The process of globalization has congealed both time and space making it easier for ideas, goods, persons, services, information, products and money to move across borders with fewer restrictions. And this has a negative effect in the entire region making it easier for arms, ammunition, insurgents, criminal and drugs to flow within national boundaries. The failure of public security in most parts of Nigeria has lead communities to indulge in different forms of ‘self-help ‘security measures, ranging from vigilante groups to community-owned arms stockpiling. Having lost confidence in the Nigerian state, parties to some of these conflicts have become entangled in a security dilemma. The quest to procure more arms to guarantee personal and community protection from perceived and real enemies is fuelling the ‘domestic arms race ‘. Therefore, as small arms remain-and proliferate – development is impeded. The impact of SALW on economic well being and national development in Nigeria is of vast significant. Therefore the need to collect these arms in circulation in Nigeria particularly the volatile area of North-east is of very important. This will hopefully contribute to government effort in building a free, secured and peaceful society.Keywords: arms, development, proliferation, security
Procedia PDF Downloads 3253164 Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle
Authors: Mir Shahriar Emami
Abstract:
Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.Keywords: SDLC, SSDLC, software security, software process engineering, hardware systems and circuits security
Procedia PDF Downloads 2593163 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 883162 Sustainable Connectivity: Power-Line Communications for Home Automation in Ethiopia
Authors: Tsegahun Milkesa
Abstract:
This study investigates the implementation of Power-Line Communications (PLC) as a sustainable solution for home automation in Ethiopia. With the country's growing technological landscape and the quest for efficient energy use, this research explores the potential of PLC to facilitate smart home systems, aiming to enhance connectivity and energy management. The primary objective is to assess the feasibility and effectiveness of PLC in Ethiopian residences, considering factors such as infrastructure compatibility, reliability, and scalability. By analyzing existing PLC technologies and their adaptability to local contexts, this study aims to propose optimized solutions tailored to the Ethiopian environment. The research methodology involves a combination of literature review, field surveys, and experimental setups to evaluate PLC's performance in transmitting data and controlling various home appliances. Additionally, socioeconomic implications, including affordability and accessibility, are examined to ensure the technology's inclusivity in diverse Ethiopian households. The findings will contribute insights into the viability of PLC for sustainable connectivity in Ethiopian homes, shedding light on its potential to revolutionize energy-efficient and interconnected living spaces. Ultimately, this study seeks to pave the way for accessible and eco-friendly smart home solutions in Ethiopia, aligning with the nation's aspirations for technological advancement and sustainability.Keywords: sustainable connectivity, power-line communications (PLC), home automation, Ethiopia, smart homes, energy efficiency, connectivity solutions, infrastructure development, sustainable living
Procedia PDF Downloads 743161 Organic Farming for Sustainable Production of Some Promising Halophytic Species in Saline Environment
Authors: Medhat Tawfik, Ezzat Abd El Lateef, Bahr Amany, Mohamed Magda
Abstract:
Applying organic farming systems in biosaline agriculture is unconventional approach for sustainable use of marginal soil and desert land for planting non-traditional halophytic crops such as Leptochloa fusca, Kochia indica, Sporobolus virginicus and Spartina patens. These plants are highly salt tolerant C4 halophytic forage plants grown well in coastal salt marsh. These halophytic plant will take important place in the farming system, especially in the coastal areas and salt-affected land. We can call it environmentally smart crops because they ensure food security, contribute to energy security, guarantee environmental sustainability, and mitigate the negative impacts of climate change. Organic Agriculture is the most important and widely practiced agro-ecological farming system. It is claimed to be the most sustainable approach and long term adaptation strategy. It promotes soil fertility and diversity at all levels and makes soils less susceptible to erosion. It is also reported to be climate change resilience farming systems as it promotes the proper management of soil, water, biodiversity and local knowledge and provides producers with ecologically sound management decisions. A field experiment was carried out at the Model Farm of National Research Centre, El Tour, South Sinai to study the impact of (Mycorrhiza 1kg/fed., charcoal 4 tons/fed., chicken manure 5 tons/fed., in addition to control treatment) on some growth characters, photosynthetic pigments content, and some physiological aspects i.e. prolind and soluble carbohydrates content, succulence and osmotic pressure values, as well as nutritive values i.e. Crude fat (CF), Acid detergent fiber (ADF), Neutral detergent fiber (NDF), Ether extract (EE) and Nitrogen-free extract (NFE) of five halophytic plant species (Leptochloa fusca, Kochia indica, Sporobolus virginicus and Spartina patens). Our results showed that organic fertilizer treatment enhanced all the previous character as compared with control with superiority to chicken manure over the other treatments.Keywords: organic agriculture, halophytic plants, saline environment, water security
Procedia PDF Downloads 2233160 Reinventing Smart Tourism via Use of Smart Gamified and Gaming Applications in Greece
Authors: Sofia Maria Poulimenou, Ioannis Deliyannis, Elisavet Filippidou, Stamatella Laboura
Abstract:
Smart technologies are being actively used to improve the experience of travel and promote or demote a destination’s reputation via a wide variety of social media applications and platforms. This paper conceptualises the design and deployment of smart management apps to promote culture, sustainability and accessibility within two destinations in Greece that represent the extremes of visiting scale. One is the densely visited Corfu, which is a UNESCO’s heritage site. The problems caused by the lack of organisation of the visiting experience and infrastructures affect all parties interacting within the site: visitors, citizens, public and private sector. Second is Kilkis, a low tourism destination with high seasonality and mostly inbound tourism. Here the issue faced is that traditional approaches to inform and motivate locals and visitors to explore and taste of the culture have not flourished. The problem is apprehended via the design and development of two systems named “Hologrammatic Corfu” for Corfu old town and “BRENDA” for the area of Kilkis. Although each system is designed independently, featuring different solutions to the problems, both approaches have been designed by the same team and a novel gaming and gamification methodology. The “Hologramatic Corfu” application has been designed, for the exploration of the site covering user requirments before, during and after the trip, with the use of transmedia content such as photos, 360-degree videos, augmented reality and hologrammatic videos. Also, a statistical analysis of travellers’ visits to specific points of interest is actively utilized enabling visitors to dynamically re-rooted during their visit, safeguarding sustainability and accessibility and inclusivity along the entire tourism cycle. “BRENDA” is designed specifically to promote gastronomic and historical tourism. This serious game implements and combines gaming and gamification elements in order to connect local businesses with cultural points of interest. As the environment of the project has a strong touristic orientation, “BRENDA” supports food-related gamified processes and historical games involving active participation of both local communities (content providers) and visitors (players) which are more likely to be successfully performed in the informal environment of travelling and promote sustainable tourism experiences. Finally, the paper presents the ability to re-use existing gaming components within new areas of interest via minimal adaptation and the use of transmedia aspects that enables destinations to be rebranded into smart destinations.Keywords: smart tourism, gamification, user experience, transmedia content
Procedia PDF Downloads 1733159 Effect of the Food Distribution on Household Food Security Status in Iran
Authors: Delaram Ghodsi, Nasrin Omidvar, Hassan Eini-Zinab, Arash Rashidian, Hossein Raghfar
Abstract:
Food supplementary programs are policy approaches that aim to reduce financial barriers to healthy diets and tackle food insecurity. This study aimed to evaluate the effect of the supportive section of Multidisciplinary Supplementary Program for Improvement of Nutritional Status of Children (MuPINSC) on households’ food security status and nutritional status of mothers. MuPINSC is a national integrative program in Iran that distributes supplementary food basket to malnourished or growth retarded children living in low-income families in addition to providing health services, including sanitation, growth monitoring, and empowerment of families. This longitudinal study is part of a comprehensive evaluation of the program. The study participants included 359 mothers of children aged 6 to 72 month under coverage of the supportive section of the program in two provinces of Iran (Semnan and Qazvin). Demographic and economic characteristics of families were assessed by a questionnaire. Data on food security of family was collected by locally adapted Household Food Insecurity Access Scale (HFIAS) at the baseline of the study and six month thereafter. Weight and height of mothers were measured at the baseline and end of the study and mother’s BMI was calculated. Data were analysed, using paired t-test, GEE (Generalized Estimating Equation), and Chi-square tests. Based on the findings, at the baseline, only 4.7% of families were food-secure, while 13.1%, 38.7% and, 43.5% were categorized as mild, moderate and severe food insecure. After six months follow up, the distribution of different levels of food security changed significantly (P<0.001) to 7.9%, 11.6%, 42.6%, and 38%, respectively. At the end of the study, the chance of food insecurity was significantly 20% lower than the beginning (OR=0.796; 0.653-0.971). No significant difference was observed in maternal BMI based on food security (P>0.05). The findings show that the food supplementary program for children improved household food security status in the studied households. Further research is needed to assess other factors that affect the effectiveness of this large scale program on nutritional status and household’s food security.Keywords: food security, food supplementary program, household, malnourished children
Procedia PDF Downloads 4003158 Impact of HIV/AIDS on Food Security in Pala Sub-Location, Bondo District, Kenya
Authors: S. B. Otieno, Were Fred, E. W. Kabiru, K. Waza
Abstract:
Background: HIV/AIDS is leading to the loss of labor through sickness and subsequent death, this is leading to the neglect of farm and off-farm activities, with the subsequent loss of potential income and food security. The situation is sensitive to seasonal labour peaks in agriculture. This study was done to determine the impact of high HIV prevalence in farming systems and food security in Pala Bondo District, Kenya. Methods: In this study, 386 respondents were randomly chosen in Pala Sub-Location. The respondents and key informants were interviewed using structured questionnaire. The data were entered and analyzed using SPSS version 16. Results: It was established that majority of respondents (67%) were between 18 and 35 years {χ2 = (1, N = 386) = 13.430, p = 0.000} (chimney effect). The study also established that 83.5% of respondents were married {χ2 = (1, N= 370) = 166.277 p = 0.000} and predominant occupation being farming and fishing (61%), while 52.8% of farm labour was by hand, 26% by oxen, and 4.9% mechanized. 73.2% of respondents only farm 0.25 to 2 acres, 48% mentioned lack of labour in land preparation {χ2 ((1,N = 321) = 113.146, p = 0.000), in planting {χ2 (1, N = 321) = 29.28, p = 0.000}. Majority of respondents lack food from January to June, during which 93% buy food. Conclusion: The high HIV prevalence in Pala has affected the farm labour leading to food insecurity.Keywords: food security, HIV, AIDS, labour
Procedia PDF Downloads 2683157 Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria
Authors: Oyekan Kolawole Jamiu
Abstract:
The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria.Keywords: terrorism, intelligent gathering, right to life, prosecution
Procedia PDF Downloads 3473156 Unauthorized License Verifier and Secure Access to Vehicle
Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi
Abstract:
In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.Keywords: license, verifier, EEPROM, secure, overload detection
Procedia PDF Downloads 2403155 Advancing Sustainable Seawater Desalination Technologies: Exploring the Sub-Atmospheric Vapor Pipeline (SAVP) and Energy-Efficient Solution for Urban and Industrial Water Management in Smart, Eco-Friendly, and Green Building Infrastructure
Authors: Mona Shojaei
Abstract:
The Sub-Atmospheric Vapor Pipeline (SAVP) introduces a distinct approach to seawater desalination with promising applications in both land and industrial sectors. SAVP systems exploit the temperature difference between a hot source and a cold environment to facilitate efficient vapor transfer, offering substantial benefits in diverse industrial and field applications. This approach incorporates dynamic boundary conditions, where the temperatures of hot and cold sources vary over time, particularly in natural and industrial environments. Such variations critically influence convection and diffusion processes, introducing challenges that require the refinement of the convection-diffusion equation and the derivation of temperature profiles along the pipeline through advanced engineering mathematics. This study formulates vapor temperature as a function of time and length using two mathematical approaches: Eigen functions and Green’s equation. Combining detailed theoretical modeling, mathematical simulations, and extensive field and industrial tests, this research underscores the SAVP system’s scalability for real-world applications. Results reveal a high degree of accuracy, highlighting SAVP’s significant potential for energy conservation and environmental sustainability. Furthermore, the integration of SAVP technology within smart and green building systems creates new opportunities for sustainable urban water management. By capturing and repurposing vapor for non-potable uses such as irrigation, greywater recycling, and ecosystem support in green spaces, SAVP aligns with the principles of smart and green buildings. Smart buildings emphasize efficient resource management, enhanced system control, and automation for optimal energy and water use, while green buildings prioritize environmental impact reduction and resource conservation. SAVP technology bridges both paradigms, enhancing water self-sufficiency and reducing reliance on external water supplies. The sustainable and energy-efficient properties of SAVP make it a vital component in resilient infrastructure development, addressing urban water scarcity while promoting eco-friendly living. This dual alignment with smart and green building goals positions SAVP as a transformative solution in the pursuit of sustainable urban resource management.Keywords: sub-atmospheric vapor pipeline, seawater desalination, energy efficiency, vapor transfer dynamics, mathematical modeling, sustainable water solutions, smart buildings
Procedia PDF Downloads 93154 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria
Authors: Anyaogu Paul
Abstract:
The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.Keywords: child labour, family income, national security, survey research
Procedia PDF Downloads 4233153 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 2503152 Critically Analyzing the Application of Big Data for Smart Transportation: A Case Study of Mumbai
Authors: Tanuj Joshi
Abstract:
Smart transportation is fast emerging as a solution to modern cities’ approach mobility issues, delayed emergency response rate and high congestion on streets. Present day scenario with Google Maps, Waze, Yelp etc. demonstrates how information and communications technologies controls the intelligent transportation system. This intangible and invisible infrastructure is largely guided by the big data analytics. On the other side, the exponential increase in Indian urban population has intensified the demand for better services and infrastructure to satisfy the transportation needs of its citizens. No doubt, India’s huge internet usage is looked as an important resource to guide to achieve this. However, with a projected number of over 40 billion objects connected to the Internet by 2025, the need for systems to handle massive volume of data (big data) also arises. This research paper attempts to identify the ways of exploiting the big data variables which will aid commuters on Indian tracks. This study explores real life inputs by conducting survey and interviews to identify which gaps need to be targeted to better satisfy the customers. Several experts at Mumbai Metropolitan Region Development Authority (MMRDA), Mumbai Metro and Brihanmumbai Electric Supply and Transport (BEST) were interviewed regarding the Information Technology (IT) systems currently in use. The interviews give relevant insights and requirements into the workings of public transportation systems whereas the survey investigates the macro situation.Keywords: smart transportation, mobility issue, Mumbai transportation, big data, data analysis
Procedia PDF Downloads 1783151 Secure Optical Communication System Using Quantum Cryptography
Authors: Ehab AbdulRazzaq Hussein
Abstract:
Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).
Procedia PDF Downloads 4013150 Ontologies for Social Media Digital Evidence
Authors: Edlira Kalemi, Sule Yildirim-Yayilgan
Abstract:
Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.Keywords: criminal digital evidence, social media, ontologies, reasoning
Procedia PDF Downloads 3873149 Omni: Data Science Platform for Evaluate Performance of a LoRaWAN Network
Authors: Emanuele A. Solagna, Ricardo S, Tozetto, Roberto dos S. Rabello
Abstract:
Nowadays, physical processes are becoming digitized by the evolution of communication, sensing and storage technologies which promote the development of smart cities. The evolution of this technology has generated multiple challenges related to the generation of big data and the active participation of electronic devices in society. Thus, devices can send information that is captured and processed over large areas, but there is no guarantee that all the obtained data amount will be effectively stored and correctly persisted. Because, depending on the technology which is used, there are parameters that has huge influence on the full delivery of information. This article aims to characterize the project, currently under development, of a platform that based on data science will perform a performance and effectiveness evaluation of an industrial network that implements LoRaWAN technology considering its main parameters configuration relating these parameters to the information loss.Keywords: Internet of Things, LoRa, LoRaWAN, smart cities
Procedia PDF Downloads 1473148 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study
Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly
Abstract:
In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions
Procedia PDF Downloads 813147 Decision Support Tool for Water Re-used Systems
Authors: Katarzyna Pawęska, Aleksandra Bawiec, Ewa Burszta-Adamiak, Wiesław Fiałkiewicz
Abstract:
The water shortage becomes a serious problem not only in African and Middle Eastern countries, but also recently in the European Union. Scarcity of water means that not all agricultural, industrial and municipal needs will be met. When the annual availability of renewable freshwater per capita is less than 1,700 cubic meters, countries begin to experience periodic or regular water shortages. The phenomenon of water stress is the result of an imbalance between the constantly growing demand for water and its availability. The constant development of industry, population growth, and climate changes make the situation even worse. The search for alternative water sources and independent supplies is becoming a priority for many countries. Data enabling the assessment of country’s condition regarding water resources, water consumption, water price, wastewater volume, forecasted climate changes e.g. temperature, precipitation, are scattered and their interpretation by common entrepreneurs may be difficult. For this purpose, a digital tool has been developed to support decisions related to the implementation of water and wastewater re-use systems, as a result of an international research project “Framework for organizational decision-making process in water reuse for smart cities” (SMART-WaterDomain) funded under the EIG-CONCERT Japan call on Smart Water Management for Sustainable Society. The developed geo-visualization tool graphically presents, among others, data about the capacity of wastewater treatment plants and the volume of water demand in the private and public sectors for Poland, Germany, and the Czech Republic. It is expected that such a platform, extended with economical water management data and climate forecasts (temperature, precipitation), will allow in the future independent investigation and assessment of water use rate and wastewater production on the local and regional scale. The tool is a great opportunity for small business owners, entrepreneurs, farmers, local authorities, and common users to analyze the impact of climate change on the availability of water in the regions of their business activities. Acknowledgments: The authors acknowledge the support of the Project Organisational Decision Making in Water Reuse for Smart Cities (SMART- WaterDomain), funded by The National Centre for Research and Development and supported by the EIG-Concert Japan.Keywords: circular economy, digital tool, geo-visualization, wastewater re-use
Procedia PDF Downloads 563146 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment
Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan
Abstract:
In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.Keywords: border security, sensors, abnormal activity detection, ontologies
Procedia PDF Downloads 480