Search results for: instrument security factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8741

Search results for: instrument security factor

7931 Impairments Correction of Six-Port Based Millimeter-Wave Radar

Authors: Dan Ohev Zion, Alon Cohen

Abstract:

In recent years, the presence of short-range millimeter-wave radar in civil application has increased significantly. Autonomous driving, security, 3D imaging and high data rate communication systems are a few examples. The next challenge is the integration inside small form-factor devices, such as smartphones (e.g. gesture recognition). The main challenge is implementation of a truly low-power, low-complexity high-resolution radar. The most popular approach is the Frequency Modulated Continuous Wave (FMCW) radar, with an analog multiplication front-end. In this paper, we present an approach for adaptive estimation and correction of impairments of such front-end, specifically implemented using the Six-Port Device (SPD) as the multiplier element. The proposed algorithm was simulated and implemented on a 60 GHz radar lab prototype.

Keywords: radar, FMCW Radar, IQ mismatch, six port

Procedia PDF Downloads 148
7930 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 500
7929 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective

Authors: Geuna Kim, Sanghyun Kim

Abstract:

This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.

Keywords: information security management, need pull, technology push, regulatory pressure

Procedia PDF Downloads 287
7928 Effect of Reinforcement Density on the Behaviour of Reinforced Sand Under a Square Footing

Authors: Dhyaalddin Bahaalddin Noori Zangana

Abstract:

This study involves the behavior of reinforced sand under a square footing. A series of bearing capacity tests were performed on a small-scale laboratory model, which filled with a poorly-graded homogenous bed of sand, which was placed in a medium dense state using sand raining technique. The sand was reinforced with 40 mm wide household aluminum foil strips. The main studied parameters was to consider the effect of reinforcing strip length, with various linear density of reinforcement, number of reinforcement layers and depth of top layer of reinforcement below the footing, on load-settlement behavior, bearing capacity ratio and settlement reduction factor. The relation of load-settlement generally showed similar trend in all the tests. Failure was defined as settlement equal to 10% of the footing width. The recommended optimum reinforcing strip length, linear density of reinforcement, number of reinforcement layers and depth of top layer of reinforcing strips that give the maximum bearing capacity improvement and minimum settlement reduction factor were presented and discussed. Different bearing capacity ration versus length of the reinforcing strips and settlement reduction factor versus length of the reinforcing strips relations at failure were showed improvement of bearing capacity ratio by a factor of 3.82 and reduction of settlement reduction factor by a factor of 0.813. The optimum length of reinforcement was found to be 7.5 times the footing width.

Keywords: square footing, relative density, linear density of reinforcement, bearing capacity ratio, load-settlement behaviour

Procedia PDF Downloads 94
7927 Predicting Wearable Technology Readiness in a South African Government Department: Exploring the Influence of Wearable Technology Acceptance and Positive Attitude

Authors: Henda J Thomas, Cornelia PJ Harmse, Cecile Schultz

Abstract:

Wearables are one of the technologies that will flourish within the fourth industrial revolution and digital transformation arenas, allowing employers to integrate collected data into organisational information systems. The study aimed to investigate whether wearable technology readiness can predict employees’ acceptance to wear wearables in the workplace. The factors of technology readiness predisposition that predict acceptance and positive attitudes towards wearable use in the workplace were examined. A quantitative research approach was used. The population consisted of 8 081 South African Department of Employment and Labour employees (DEL). Census sampling was used, and questionnaires to collect data were sent electronically to all 8 081 employees, 351 questionnaires were received back. The measuring instrument called the Technology Readiness and Acceptance Model (TRAM) was used in this study. Four hypotheses were formulated to investigate the relationship between readiness and acceptance of wearables in the workplace. The results found consistent predictions of technology acceptance (TA) by eagerness, optimism, and discomfort in the technology readiness (TR) scales. The TR scales of optimism and eagerness were consistent positive predictors of the TA scales, while discomfort proved to be a negative predictor for two of the three TA scales. Insecurity was found not to be a predictor of TA. It was recommended that the digital transformation policy of the DEL should be revised. Wearables in the workplace should be embraced from the viewpoint of convenience, automation, and seamless integration with the DEL information systems. The empirical contribution of this study can be seen in the fact that positive attitude emerged as a factor that extends the TRAM. In this study, positive attitude is identified as a new dimension to the TRAM not found in the original TA model and subsequent studies of the TRAM. Furthermore, this study found that Perceived Usefulness (PU) and Behavioural Intention to Use and (BIU) could not be separated but formed one factor. The methodological contribution of this study can lead to the development of a Wearable Readiness and Acceptance Model (WRAM). To the best of our knowledge, no author has yet introduced the WRAM into the body of knowledge.

Keywords: technology acceptance model, technology readiness index, technology readiness and acceptance model, wearable devices, wearable technology, fourth industrial revolution

Procedia PDF Downloads 81
7926 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 208
7925 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 178
7924 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 213
7923 Contextualizing Policing in Local Communities: The Way Forward for Ghana Police Service

Authors: Bernard Owusu Asare

Abstract:

This study investigates the implementation and efficacy of community policing within the Ghana Police Service, with a focus on its impact on local communities. Emphasizing the goal of creating safer environments and improving the overall quality of life, the research engages opinion leaders from selected communities in Ghana, as well as members of the police force stationed within these communities. Employing a semi-structured interview guide as the primary research instrument, data collection involves face-to-face interviews conducted at respondents' residences and policing centers. The preliminary findings underscore the pivotal role of collaborative efforts between community elders and police personnel in the successful execution of community policing initiatives. Furthermore, the study identifies gainful employment for the youth as a key determinant of effective policing, highlighting the interconnectedness of socioeconomic factors with law enforcement outcomes. The study further reveals that access to the internet emerges as a factor influencing both policing practices and the overall quality of life within these communities. By contextualizing the dynamics of community policing in the local Ghanaian context, this research aims to contribute valuable insights to the ongoing discourse on effective law enforcement strategies and their impact on community well-being.

Keywords: community, policing, police service, Ghana

Procedia PDF Downloads 59
7922 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 164
7921 Critical Success Factor of Exporting Thailand’s Ginger to Japan

Authors: Phutthiwat Waiyawuththanapoom, Pimploi Tirastittam, Manop Tirastittam

Abstract:

Thailand is the agriculture country which mainly exports the agriculture product to the other countries in so many ways which are fresh vegetable, chilled vegetable or frozen vegetable. The gross export for Thailand’s vegetable is 30-40 billion baht per year, and the growth rate is about 15-20 percent per year. Ginger is one of the main vegetable product that Thailand export to Japan because Thailand’s Ginger has a good quality and be able to supply Japan’s demand with a reasonable price. This research paper is aimed to study the factors which affect the efficiency of the supply chain process of Thailand’s ginger to Japan. There are 5 factors which related to the exporting Thailand’s ginger to Japan which are quality, price, equipment and supply standard, custom process and distribution pattern. The result of the research showed that the factor which reached the 'very good' significant level is quality of Thailand’s ginger with the score of 4.86. The other 5 factors are in the 'good' significant level. So the most important factor for Thai ginger farmer to concern is the quality of the product.

Keywords: critical success factor, export, ginger, supply chain

Procedia PDF Downloads 359
7920 An Animation-Based Resource for Screening Emotional and Behavioural Distress in Children Aged 6 to 12

Authors: Zoe Lynch, Kirsty Zieschank

Abstract:

There are several factors that compromise the utility and wide-spread use of existing emotional and behavioural distress screening instruments. Some of these factors include lengthy administration times, high costs, feasibility issues, and a lack of self-report options for children under 12 years of age. This animation-based resource was developed to overcome as many of these factors as possible. Developed for educators and medical and mental health professionals, this resource offers children a self-guided mechanism for reporting any current emotional and behavioural distress. An avatar assistant, selected by the child, accompanies them through each stage of the screening process, offering further instruction if prompted. Children enter their age and gender before viewing comparative animations conveying common childhood emotional and behavioural difficulties. The child then selects the most relatable animations, along with the frequency with which they experience the depicted emotions. From a perspective of intellectual development, an engaging, animated format means that outcomes will not be constrained by children’s reading, writing, cognitive, or verbal expression abilities. Having been user-tested with children aged 6 to 12, this resource shows promising results as a self-guided screening instrument.

Keywords: animation-based screening instrument, mental health, primary-aged children, self-guided

Procedia PDF Downloads 152
7919 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 236
7918 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 485
7917 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province

Authors: Sakapas Saengchai

Abstract:

A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.

Keywords: security, border trade, customs, participation, people

Procedia PDF Downloads 172
7916 Energy Security and Sustainable Development: Challenges and Prospects

Authors: Abhimanyu Behera

Abstract:

Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.

Keywords: energy, policies, security, sustainability

Procedia PDF Downloads 382
7915 Spatial Distribution and Source Identification of Trace Elements in Surface Soil from Izmir Metropolitan Area

Authors: Melik Kara, Gulsah Tulger Kara

Abstract:

The soil is a crucial component of the ecosystem, and in industrial and urban areas it receives large amounts of trace elements from several sources. Therefore, accumulated pollutants in surface soils can be transported to different environmental components, such as deep soil, water, plants, and dust particles. While elemental contamination of soils is caused mainly by atmospheric deposition, soil also affects the air quality since enriched trace elemental contents in atmospheric particulate matter originate from resuspension of polluted soils. The objectives of this study were to determine the total and leachate concentrations of trace elements in soils of city area in Izmir and characterize their spatial distribution and to identify the possible sources of trace elements in surface soils. The surface soil samples were collected from 20 sites. They were analyzed for total element concentrations and leachate concentrations. Analyses of trace elements (Ag, Al, As, B, Ba, Be, Bi, Ca, Cd, Ce, Co, Cr, Cs, Cu, Dy, Er, Eu, Fe, Ga, Gd, Hf, Ho, K, La, Li, Lu, Mg, Mn, Mo, Na, Nd, Ni, P, Pb, Pr, Rb, Sb, Sc, Se, Si, Sm, Sn, Sr, Tb, Th, Ti, Tl, Tm, U, V, W, Y, Yb, Zn and Zr) were carried out using ICP-MS (Inductively Coupled Plasma-Mass Spectrometer). The elemental concentrations were calculated along with overall median, kurtosis, and skewness statistics. Elemental composition indicated that the soil samples were dominated by crustal elements such as Si, Al, Fe, Ca, K, Mg and the sea salt element, Na which is typical for Aegean region. These elements were followed by Ti, P, Mn, Ba and Sr. On the other hand, Zn, Cr, V, Pb, Cu, and Ni (which are anthropogenic based elements) were measured as 61.6, 39.4, 37.9, 26.9, 22.4, and 19.4 mg/kg dw, respectively. The leachate element concentrations were showed similar sorting although their concentrations were much lower than total concentrations. In the study area, the spatial distribution patterns of elemental concentrations varied among sampling sites. The highest concentrations were measured in the vicinity of industrial areas and main roads. To determine the relationships among elements and to identify the possible sources, PCA (Principal Component Analysis) was applied to the data. The analysis resulted in six factors. The first factor exhibited high loadings of Co, K, Mn, Rb, V, Al, Fe, Ni, Ga, Se, and Cr. This factor could be interpreted as residential heating because of Co, K, Rb, and Se. The second factor associated positively with V, Al, Fe, Na, Ba, Ga, Sr, Ti, Se, and Si. Therefore, this factor presents mixed city dust. The third factor showed high loadings with Fe, Ni, Sb, As, Cr. This factor could be associated with industrial facilities. The fourth factor associated with Cu, Mo, Zn, Sn which are the marker elements of traffic. The fifth factor presents crustal dust, due to its high correlation with Si, Ca, and Mg. The last factor is loaded with Pb and Cd emitted from industrial activities.

Keywords: trace elements, surface soil, source apportionment, Izmir

Procedia PDF Downloads 135
7914 The Audit Quality Effects on Reputation of the Certified Public Accountants in Thailand

Authors: Prateep Wajeetongratana

Abstract:

This research aims to study the audit quality that affected to the reputation of the certified public accountants in Thailand. The researcher defined the population for this research as a group of the certified public accountants in Thailand who are the member of the federation of accounting professions under the royal patronage of his majesty the king also disclose their information .The total sampling size is 325. The results showed the audit quality factor has influence to the reputation of the certified public accountants in Thailand by accuracy auditing, objectiveness auditing and clearness auditing .These factors show by y1 = 1.381 + .372x1.1 + .309x1.2 + .305x1.3 can be describe as professional standard strictly factor (Y.1.1) and the new clients raised from word of mount of old clients regularly factor (Y.1.2) by regression coefficient (R2) as.242, this shows that such variables could predict the audit quality variable as 24.2 percent.

Keywords: audit quality, certified public accountants in Thailand, reputation

Procedia PDF Downloads 246
7913 Analysis of Conflict and Acceptance Factors on Water and Land Photovoltaic Facility

Authors: Taehyun Kim, Taehyun Kim, Hyunjoo Park

Abstract:

Photovoltaic facility occurs conflicts and disputes over environmental issues such as soil runoff, landscapes damage, and ecosystems damage. Because of these problems, huge social and economic cost occurred. The purpose of this study is to analyze resident‘s acceptability and conflict factors on the location of PV facilities, and suggest ways to promote resident’s acceptability and solutions for conflicts. Literature review, cases analysis, and expert interview on the acceptance and conflict factors related to the location of PV facilities are used to derive results. The results of this study are expected to contribute to the minimization of environmental impact and social conflict due to the development of renewable energy in the future.

Keywords: acceptance factor, conflict factor, factor analysis, photovoltaic facility

Procedia PDF Downloads 172
7912 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 144
7911 Bridgeless Boost Power Factor Correction Rectifier with Hold-Up Time Extension Circuit

Authors: Chih-Chiang Hua, Yi-Hsiung Fang, Yuan-Jhen Siao

Abstract:

A bridgeless boost (BLB) power factor correction (PFC) rectifier with hold-up time extension circuit is proposed in this paper. A full bridge rectifier is widely used in the front end of the ac/dc converter. Since the shortcomings of the full bridge rectifier, the bridgeless rectifier is developed. A BLB rectifier topology is utilized with the hold-up time extension circuit. Unlike the traditional hold-up time extension circuit, the proposed extension scheme uses fewer active switches to achieve a longer hold-up time. Simulation results are presented to verify the converter performance.

Keywords: bridgeless boost (BLB), boost converter, power factor correction (PFC), hold-up time

Procedia PDF Downloads 407
7910 Male Oreochromis mossambica as Indicator for Water Pollution with Trace Elements in Relation to Condition Factor from Pakistan

Authors: Muhammad Naeem, Syed M. Moeen-ud-Din Raheel, Muhammad Arshad, Muhammad Naeem Qaisar, Muhammad Khalid, Muhammad Zubair Ahmed, Muhammad Ashraf

Abstract:

Iron, Copper, Cadmium, Zinc, Manganese, Chromium levels were estimated to study the risk of trace elements on human consumption. The area of collection was Dera Ghazi Khan, Pakistan and was evaluated by means of flame atomic absorption spectrophotometer. The standards find in favor of the six heavy metals were in accordance with the threshold edge concentrations on behalf of fish meat obligatory by European and other international normative. Regressions were achieved for both size (length and weight) and condition factor with concentrations of metal present in the fish body.

Keywords: Oreochromis mossambica, toxic analysis, body size, condition factor

Procedia PDF Downloads 577
7909 A Q-Methodology Approach for the Evaluation of Land Administration Mergers

Authors: Tsitsi Nyukurayi Muparari, Walter Timo De Vries, Jaap Zevenbergen

Abstract:

The nature of Land administration accommodates diversity in terms of both spatial data handling activities and the expertise involved, which supposedly aims to satisfy the unpredictable demands of land data and the diverse demands of the customers arising from the land. However, it is known that strategic decisions of restructuring are in most cases repelled in favour of complex structures that strive to accommodate professional diversity and diverse roles in the field of Land administration. Yet despite of this widely accepted knowledge, there is scanty theoretical knowledge concerning the psychological methodologies that can extract the deeper perceptions from the diverse spatial expertise in order to explain the invisible control arm of the polarised reception of the ideas of change. This paper evaluates Q methodology in the context of a cadastre and land registry merger (under one agency) using the Swedish cadastral system as a case study. Precisely, the aim of this paper is to evaluate the effectiveness of Q methodology towards modelling the diverse psychological perceptions of spatial professionals who are in a widely contested decision of merging the cadastre and land registry components of Land administration using the Swedish cadastral system as a case study. An empirical approach that is prescribed by Q methodology starts with the concourse development, followed by the design of statements and q sort instrument, selection of the participants, the q-sorting exercise, factor extraction by PQMethod and finally narrative development by logic of abduction. The paper uses 36 statements developed from a dominant competing value theory that stands out on its reliability and validity, purposively selects 19 participants to do the Qsorting exercise, proceeds with factor extraction from the diversity using varimax rotation and judgemental rotation provided by PQMethod and effect the narrative construction using the logic abduction. The findings from the diverse perceptions from cadastral professionals in the merger decision of land registry and cadastre components in Sweden’s mapping agency (Lantmäteriet) shows that focus is rather inclined on the perfection of the relationship between the legal expertise and technical spatial expertise. There is much emphasis on tradition, loyalty and communication attributes which concern the organisation’s internal environment rather than innovation and market attributes that reveals customer behavior and needs arising from the changing humankind-land needs. It can be concluded that Q methodology offers effective tools that pursues a psychological approach for the evaluation and gradations of the decisions of strategic change through extracting the local perceptions of spatial expertise.

Keywords: cadastre, factor extraction, land administration merger, land registry, q-methodology, rotation

Procedia PDF Downloads 186
7908 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 35
7907 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 366
7906 Dynamic Amplification Factors of Some City Bridges

Authors: I. Paeglite, A. Paeglitis

Abstract:

The paper presents a study of dynamic effects obtained from the dynamic load testing of the city highway bridges in Latvia carried out from 2005 to 2012. 9 pre-stressed concrete bridges and 4 composite bridges were considered. 11 of 13 bridges were designed according to the Eurocodes but two according to the previous structural codes used in Latvia (SNIP 2.05.03-84). The dynamic properties of the bridges were obtained by heavy vehicles passing the bridge roadway with different driving speeds and with or without even pavement. The obtained values of the Dynamic amplification factor (DAF) and bridge natural frequency were analyzed and compared to the values of built-in traffic load models provided in Eurocode 1. The actual DAF values for even bridge deck in the most cases are smaller than the value adopted in Eurocode 1. Vehicle speed for uneven pavements significantly influence Dynamic amplification factor values.

Keywords: bridge, dynamic effects, load testing, dynamic amplification factor

Procedia PDF Downloads 373
7905 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 672
7904 Effects of Rising Cost of Building Materials in Nigeria: A Case Study of Adamawa State

Authors: Ibrahim Yerima Gwalem, Jamila Ahmed Buhari

Abstract:

In recent years, there has been an alarming rate of increase in the costs of building materials in Nigeria, and this ugly phenomenon threatens the contributions of the construction industry in national development. The purpose of this study was to assess the effects of the rising cost of building materials in Adamawa State Nigeria. Four research questions in line with the purpose of the study were raised to guide the study. Two null hypotheses were formulated and tested at 0.05 level of significance. The study adopted a survey research design. The population of the study comprises registered contractors, registered builders, selected merchants, and consultants in Adamawa state. Data were collected using researcher designed instrument tagged effects of the rising cost of building materials questionnaire (ERCBMQ). The instrument was subjected to face and content validation by two experts, one from Modibbo Adama University of Technology Yola and the other from Federal Polytechnic Mubi. The reliability of the instrument was determined by the Cronbach Alpha method and yielded a reliability index of 0.85 high enough to ascertain the reliability. Data collected from a field survey of 2019 was analyzed using mean and percentage. The means of the prices were used in the calculations of price indices and rates of inflation on building materials. Findings revealed that factors responsible for the rising cost of building materials are the exchange rate of the Nigeria Naira with a mean rating (MR) = 4.4; cost of fuel and power supply, MR = 4.3; and changes in government policies and legislation, MR = 4.2, while fluctuations in the construction cost with MR = 2.8; reduced volume of construction output, MR = 2.52; and risk of project abandonment, MRA = 2.51, were the three effects. The study concluded that adverse effects could result in a downward effect on the contributions of the construction industries on the gross domestic product (GDP) in the nation’s economy. Among the recommendations proffered include that the government should formulate a policy that will play down the agitations on the use of imported building materials by encouraging research in the production of local building materials.

Keywords: effects, rising, cost, building, materials

Procedia PDF Downloads 130
7903 Thermoelectrical Properties of Cs Doped BiCuSeO as Promising Oxide Materials for Thermoelectric Energy Converter

Authors: Abdenour Achour, Kan Chen, Mike Reece, Zhaorong Huang

Abstract:

Here we report the synthesis of pure and cost effective of BiCuSeO by a flux method in air, and the enhancement of the thermoelectric performance by Cs doping. The comparison between our synthesis and the usual vacuum furnace method has been studied for the pristine oxyselenides BiCuSeO. We report for very high Seebeck coefficients up to 516 μV K⁻¹ at room temperature with the electrical conductivity of 5.20 S cm⁻¹ which lead to a high power factor of 140 µWm⁻¹K⁻². We also report at the high temperatures the lowest thermal conductivity value of 0.42 µWm⁻¹K⁻¹. Upon doping with Cs, enhanced electrical conductivity coupled with a moderate Seebeck coefficient lead to a power factor of 338 µWm⁻¹K⁻² at 682 K. Moreover, it shows a very low thermal conductivity in the temperature range of 300 to 682 K (0.75 to 0.35 Wm⁻¹K⁻¹). By optimizing the power factor and reducing the thermal conductivity, this results in a high ZT of ~ 0.66 at 682 K for Bi0.995Cs0.005CuSeO.

Keywords: BiCuSeO, Cs doping, thermoelectric, oxyselenide

Procedia PDF Downloads 294
7902 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 258