Search results for: security laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3425

Search results for: security laws

2615 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 152
2614 Sustainable Use of Agricultural Waste to Enhance Food Security and Conserve the Environment

Authors: M. M. Tawfik, Ezzat M. Abd El Lateef, B. B. Mekki, Amany A. Bahr, Magda H. Mohamed, Gehan S. Bakhoom

Abstract:

The rapid increase in the world’s population coupled by decrease the arable land per capita has resulted into an increased demand for food which has in turn led to the production of large amounts of agricultural wastes, both at the farmer, municipality and city levels. Agricultural wastes can be a valuable resource for improving food security. Unfortunately, agricultural wastes are likely to cause pollution to the environment or even harm to human health. This calls for increased public awareness on the benefits and potential hazards of agricultural wastes, especially in developing countries. Agricultural wastes (residual stalks, straw, leaves, roots, husks, shells etcetera) and animal waste (manures) are widely available, renewable and virtually free, hence they can be an important resource. They can be converted into heat, steam, charcoal, methanol, ethanol, bio diesel as well as raw materials (animal feed, composting, energy and biogas construction etcetera). agricultural wastes are likely to cause pollution to the environment or even harm to human health, if it is not used in a sustainable manner. Organic wastes could be considered an important source of biofertilizer for enhancing food security in the small holder farming communities that would not afford use of expensive inorganic fertilizers. Moreover, these organic wastes contain high levels of nitrogen, phosphorus, potassium, and organic matter important for improving nutrient status of soils in urban agriculture. Organic compost leading to improved crop yields and its nutritional values as compared with inorganic fertilization. This paper briefly reviews how agricultural wastes can be used to enhance food security and conserve the environment.

Keywords: agricultural waste, organic compost, environment, valuable resources

Procedia PDF Downloads 493
2613 A Multi-Modal Virtual Walkthrough of the Virtual Past and Present Based on Panoramic View, Crowd Simulation and Acoustic Heritage on Mobile Platform

Authors: Lim Chen Kim, Tan Kian Lam, Chan Yi Chee

Abstract:

This research presents a multi-modal simulation in the reconstruction of the past and the construction of present in digital cultural heritage on mobile platform. In bringing the present life, the virtual environment is generated through a presented scheme for rapid and efficient construction of 360° panoramic view. Then, acoustical heritage model and crowd model are presented and improvised into the 360° panoramic view. For the reconstruction of past life, the crowd is simulated and rendered in an old trading port. However, the keystone of this research is in a virtual walkthrough that shows the virtual present life in 2D and virtual past life in 3D, both in an environment of virtual heritage sites in George Town through mobile device. Firstly, the 2D crowd is modelled and simulated using OpenGL ES 1.1 on mobile platform. The 2D crowd is used to portray the present life in 360° panoramic view of a virtual heritage environment based on the extension of Newtonian Laws. Secondly, the 2D crowd is animated and rendered into 3D with improved variety and incorporated into the virtual past life using Unity3D Game Engine. The behaviours of the 3D models are then simulated based on the enhancement of the classical model of Boid algorithm. Finally, a demonstration system is developed and integrated with the models, techniques and algorithms of this research. The virtual walkthrough is demonstrated to a group of respondents and is evaluated through the user-centred evaluation by navigating around the demonstration system. The results of the evaluation based on the questionnaires have shown that the presented virtual walkthrough has been successfully deployed through a multi-modal simulation and such a virtual walkthrough would be particularly useful in a virtual tour and virtual museum applications.

Keywords: Boid Algorithm, Crowd Simulation, Mobile Platform, Newtonian Laws, Virtual Heritage

Procedia PDF Downloads 244
2612 Application of Logistics Regression Model to Ascertain the Determinants of Food Security among Households in Maiduguri, Metropolis, Borno State, Nigeria

Authors: Abdullahi Yahaya Musa, Harun Rann Bakari

Abstract:

The study examined the determinants of food security among households in Maiduguri, Metropolis, Borno State, Nigeria. The objectives of the study are to: examine the determinants of food security among households; identify the coping strategies employed by food-insecure households in Maiduguri, Metropolis, Borno State, Nigeria. The population of the study is 843,964 respondents out of which 400 respondents were sampled. The study used a self-developed questionnaire to collect data from four hundred (400) respondents. Four hundred (400) copies of questionnaires were administered and all were retrieved, making 100% return rate. The study employed descriptive and inferential statistics for data analysis. Descriptive statistics (frequency counts and percentages) was used to analyze the socio-economic characteristics of the respondents and objective four, while inferential statistics (logit regression analysis) was used to analyze one. Four hundred (400) copies of questionnaires were administered and all the four hundred (400) were retrieved, making a 100% return rate. The results were presented in tables and discussed according to the research objectives. The study revealed that HHA, HHE, HHSZ, HHSX, HHAS, HHI, HHFS, HHFE, HHAC and HHCDR were the determinants of food security in Maiduguri Metropolis. Relying on less preferred foods, purchasing food on credit, limiting food intake to ensure children get enough, borrowing money to buy foodstuffs, relying on help from relatives or friends outside the household, adult family members skipping or reducing a meal because of insufficient finances and ration money to household members to buy street food were the coping strategies employed by food-insecure households in Maiduguri metropolis. The study recommended that Nigeria Government should intensify the fight against the Boko haram insurgency. This will put an end to Boko Haram Insurgency and enable farmers to return to farming in Borno state.

Keywords: internally displaced persons, food security, coping strategies, descriptive statistics, logistics regression model, odd ratio

Procedia PDF Downloads 117
2611 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 102
2610 Rights, Differences and Inclusion: The Role of Transdisciplinary Approach in the Education for Diversity

Authors: Ana Campina, Maria Manuela Magalhaes, Eusebio André Machado, Cristina Costa-Lobo

Abstract:

Inclusive school advocates respect for differences, for equal opportunities and for a quality education for all, including for students with special educational needs. In the pursuit of educational equity, guaranteeing equality in access and results, it becomes the responsibility of the school to recognize students' needs, adapting to the various styles and rhythms of learning, ensuring the adequacy of curricula, strategies and resources, materials and humans. This paper presents a set of theoretical reflections in the disciplinary interface between legal and education sciences, school administration and management, with the aim of understand the real inclusion characteristics in a balance with the inclusion policies and the need(s) of an education for Human Rights, especially for diversity. Considering the actual social complexity but the important education instruments and strategies, mostly patented in the policies, this paper aims expose the existing contexts opposed to the laws, policies and inclusion educational needs. More than a single study, this research aims to develop a map of the reality and the guidelines to implement the action. The results point to the usefulness and pertinence of a school in which educational managers, teachers, parents, and students, are involved in the creation, implementation and monitoring of flexible curricula and adapted to the educational needs of students, promoting a collaborative work among teachers. We are then faced with a scenario that points to the need to reflect on the legislation and curricular management of inclusive classes and to operationalize the processes of elaboration of curricular adaptations and differentiation in the classroom. The transdisciplinary is a pedagogic and social education perfect approach using the Human Rights binomio – teaching and learning – supported by the inclusion laws according to the realistic needs for an effective successful society construction.

Keywords: rights, transdisciplinary, inclusion policies, education for diversity

Procedia PDF Downloads 362
2609 An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective

Authors: Asim Majeed, Rehan Bhana, Mak Sharma, Rebecca Goode, Nizam Bolia, Mike Lloyd-Williams

Abstract:

This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.

Keywords: innovation, virtualization, cloud computing, organizational flexibility

Procedia PDF Downloads 360
2608 Transfer of Contractual Right of Suit Evidenced in Carriage Contract of Bill of Lading in Nigeria

Authors: Eunice Chiamaka Allen-Ngbale

Abstract:

Prior to bill of lading (BOL), merchants travelled along with their goods; then recorded the goods in the ship’s mates’ register; and finally started selling the goods while in transit by way of BOL, indicative that BOL is negotiable. Common law doctrine of privity of contract did not allow the transfer of right to sue to a non-party to the contract. This created hardship to cargo owners, which made many jurisdictions enact laws in this regard. Bill of Lading Act 1855 (BLA) was enacted in the United Kingdom, which applied as statute of general application under section 375 Merchant Shipping Act 1990 (MSA) in Nigeria; and conferred contractual rights of the suit on consignees and endorsees, but on the passing of ownership upon or by reason of such consignment or endorsement on the shipment of the goods simultaneously. The repeal of section 375 MSA by section 439 MSA 2007 created a lacuna, and the doctrine of privity of contract is the extant law in Nigeria. The aim of this study is to evaluate laws governing the transfer of the contractual right of suit to a third party under the bill of lading in Nigeria. The specific objectives of this study are to ascertain: (i) whether the extant law of common law doctrine of privity of the contract covers the transfer of the right of suit to the third party under the bill of lading in Nigeria; (ii) impediment(s) of the common law to transfer such right in Nigeria in the absence of any legislation; (iii) the level of applicability of the doctrine of privity of contract as it relates to transfer of the contractual right of suit to third party under the bill of lading in Nigeria; and (iv) whether to proffer possible suggestion on how to fill the lacuna left by the repeal of Merchant Shipping Act 1990. This work adopted a doctrinal approach with reliance on primary and secondary source materials. It finds that the common law doctrine of privity of contract in Nigeria is retrogressive. This work recommends for amendment of the relevant statute to cure this defect/lacuna like other commonwealth nations for best international practices.

Keywords: contract of carriage by sea, doctrine of privity of contract, lawful holder of bill of lading, third party right of suit

Procedia PDF Downloads 138
2607 Power Line Communication Integrated in a Wireless Power Transfer System: Feasibility of Surveillance Movement

Authors: M. Hemnath, S. Kannan, R. Kiran, K. Thanigaivelu

Abstract:

This paper is based on exploring the possible opportunities and applications using Power Line Communication (PLC) for security and surveillance operations. Various research works are done for introducing PLC into onboard vehicle communication and networking (CAN, LIN etc.) and various international standards have been developed. Wireless power transfer (WPT) is also an emerging technology which is studied and tested for recharging purposes. In this work we present a system which embeds the detection and the response into one which eliminates the need for dedicated network for data transmission. Also we check the feasibility for integrating wireless power transfer system into this proposed security system for transmission of power to detection unit wirelessly from the response unit.

Keywords: power line communication, wireless power transfer, surveillance

Procedia PDF Downloads 509
2606 Gender of the Infant and Interpersonal Relationship Correlates of Postpartum Depression among Women in Gilgit, Gilgit-Baltistan, Pakistan

Authors: Humaira Mujeeb, Farah Qadir

Abstract:

The present study aimed to explore the association between interpersonal relationship and postpartum depression with a special focus on gender of the infant among women in Gilgit, Gilgit-Baltistan, Pakistan. The research was quantitative in nature. It was a correlation study with a cross-sectional study design. The target population was women between six weeks to six months after the delivery of a baby. The sample size of 158 women has been computed by using G*Power (3.0.10 version). The sample was taken through quota sampling technique which was used to gather data according to the specifically predefined groups (79 women with female infants and 79 women with male infants). The sample was selected non-randomly according to the fixed quota. A protocol which had demographic and interpersonal relationship variables alongside with the Urdu version Edinburgh postnatal depression scale was used to collect the relevant data. The data was analyzed by using SPSS 16.0 software package. A statistically significant association between the attachment with husband in women who had a female infant and postpartum depression has been found. The association between the husband’s emotional and physical support in women who had a female infant and postpartum depression had also been found significant. In case of women with a male infant, the association between support of in-laws and postpartum depression is statistically significant. An association between the violence/discrimination based on the basis of infant's gender in women who had a female infant and postpartum depression is also found. These findings points out that when studying the correlates of postpartum depression, it is imperative to carry out an analysis in the context of gender by considering gender of the infant especially in societies where strict gender preferences exists.

Keywords: infant, gender, attachment, husband, in-laws, support, violence, discrimination, Edinburgh postnatal depression scale, Gilgit, Pakistan

Procedia PDF Downloads 576
2605 Digital Twin for Retail Store Security

Authors: Rishi Agarwal

Abstract:

Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.

Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety

Procedia PDF Downloads 45
2604 Adopting a New Policy in Maritime Law for Protecting Ship Mortgagees Against Maritime Liens

Authors: Mojtaba Eshraghi Arani

Abstract:

Ship financing is the vital element in the development of shipping industry because while the ship constitutes the owners’ main asset, she is considered a reliable security in the financiers’ viewpoint as well. However, it is most probable that a financier who has accepted a ship as security will face many creditors who are privileged and rank before him for collecting, out of the ship, the money that they are owed. In fact, according to the current rule of maritime law, which was established by “Convention Internationale pour l’Unification de Certaines Règles Relatives aux Privilèges et Hypothèques Maritimes, Brussels, 10 April 1926”, the mortgages, hypotheques, and other charges on vessels rank after several secured claims referred to as “maritime liens”. Such maritime liens are an exhaustive list of claims including but not limited to “expenses incurred in the common interest of the creditors to preserve the vessel or to procure its sale and the distribution of the proceeds of sale”, “tonnage dues, light or harbour dues, and other public taxes and charges of the same character”, “claims arising out of the contract of engagement of the master, crew and other persons hired on board”, “remuneration for assistance and salvage”, “the contribution of the vessel in general average”, “indemnities for collision or other damage caused to works forming part of harbours, docks, etc,” “indemnities for personal injury to passengers or crew or for loss of or damage to cargo”, “claims resulting form contracts entered into or acts done by the master”. The same rule survived with only some minor change in the categories of maritime liens in the substitute conventions 1967 and 1993. The status que in maritime law have always been considered as a major obstacle to the development of shipping market and has inevitably led to increase in the interest rates and other related costs of ship financing. It seems that the national and international policy makers have yet to change their mind being worried about the deviation from the old marine traditions. However, it is crystal clear that the continuation of status que will harm, to a great extent, the shipowners and, consequently, the international merchants as a whole. It is argued in this article that the raison d'être for many categories of maritime liens cease to exist anymore, in view of which, the international community has to recognize only a minimum category of maritime liens which are created in the common interests of all creditors; to this effect, only two category of “compensation due for the salvage of ship” and “extraordinary expenses indispensable for the preservation of the ship” can be declared as taking priority over the mortgagee rights, in anology with the Geneva Convention on the International Recognition of Rights in Aircrafts (1948). A qualitative method with the concept of interpretation of data collection has been used in this manuscript. The source of the data is the analysis of international conventions and domestic laws.

Keywords: ship finance, mortgage, maritime liens, brussels convenion, geneva convention 1948

Procedia PDF Downloads 50
2603 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 297
2602 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 334
2601 Study of the Impact of Quality Management System on Chinese Baby Dairy Product Industries

Authors: Qingxin Chen, Liben Jiang, Andrew Smith, Karim Hadjri

Abstract:

Since 2007, the Chinese food industry has undergone serious food contamination in the baby dairy industry, especially milk powder contamination. One of the milk powder products was found to contain melamine and a significant number (294,000) of babies were affected by kidney stones. Due to growing concerns among consumers about food safety and protection, and high pressure from central government, companies must take radical action to ensure food quality protection through the use of an appropriate quality management system. Previously, though researchers have investigated the health and safety aspects of food industries and products, quality issues concerning food products in China have been largely over-looked. Issues associated with baby dairy products and their quality issues have not been discussed in depth. This paper investigates the impact of quality management systems on the Chinese baby dairy product industry. A literature review was carried out to analyse the use of quality management systems within the Chinese milk power market. Moreover, quality concepts, relevant standards, laws, regulations and special issues (such as Melamine, Flavacin M1 contamination) have been analysed in detail. A qualitative research approach is employed, whereby preliminary analysis was conducted by interview, and data analysis based on interview responses from four selected Chinese baby dairy product companies was carried out. Through the analysis of literature review and data findings, it has been revealed that for quality management system that has been designed by many practitioners, many theories, models, conceptualisation, and systems are present. These standards and procedures should be followed in order to provide quality products to consumers, but the implementation is lacking in the Chinese baby dairy industry. Quality management systems have been applied by the selected companies but the implementation still needs improvement. For instance, the companies have to take measures to improve their processes and procedures with relevant standards. The government need to make more interventions and take a greater supervisory role in the production process. In general, this research presents implications for the regulatory bodies, Chinese Government and dairy food companies. There are food safety laws prevalent in China but they have not been widely practiced by companies. Regulatory bodies must take a greater role in ensuring compliance with laws and regulations. The Chinese government must also play a special role in urging companies to implement relevant quality control processes. The baby dairy companies not only have to accept the interventions from the regulatory bodies and government, they also need to ensure that production, storage, distribution and other processes will follow the relevant rules and standards.

Keywords: baby dairy product, food quality, milk powder contamination, quality management system

Procedia PDF Downloads 450
2600 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 148
2599 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 78
2598 The Sustainability of Health and Safety on Construction Sites in Zamfara State

Authors: Ismaila Oladunni Muhammed, Adegbenga Raphael Ashiru

Abstract:

Construction industry has been attributed to be the engine growth of Nigerian economic and infrastructural development. It promotes infrastructural development and grows an average output of Nigerian Gross Domestic Profit. However, from this great prospect, yearly reports show that consistent accidents on construction sites in Zamfara State has affected a substantial number of workers as they become temporarily or permanently disabled, thereby making many construction sites a death trap. This posed a great threat to the industry’s sustainability, de- motivate workers from working in the industry, and further have negative impact on the economy as well. It is as a result of high construction site accident currently experiencing in Zamfara state that this research was carried out to appraise the sustainability of health and safety of construction workers on sites. The proper practice and compliance to Construction Health and safety laws are very vital to the output and growth of Zamfara State construction sector. However, a quantitative approach was adopted to justify the aforesaid statement which will provide a broader understanding of the study. Descriptive statistical analysis was obtained through Statistical Package for the Social Sciences (SPSS Version 20). Furthermore, the findings from the research highlighted that the performance and output of construction workers on construction sites depends on the proper practice of health and safety. The research findings also recommended ways to enhance employers and employee’s compliance with existing laws guiding health and safety on Zamfara State construction sites. Nevertheless, the purpose of the paper is to appraise the sustainability of Health and Safety on Zamfara State construction sites. This study further provided thorough information for resolving challenges of construction sites accidents to improve construction firm productivity and also ensured construction worker’s safety on site.

Keywords: construction industry, health and safety regulations, causes of accident, construction safety practices

Procedia PDF Downloads 192
2597 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 188
2596 Social Responsibility and Environmental Issues Addressed by Businesses in Romania

Authors: Daniela Gradinaru, Iuliana Georgescu, Loredana Hutanu (Toma), Mihai-Bogdan Afrasinei

Abstract:

This article aims to analyze the situation of Romanian companies from an environmental point of view. Environmental issues are addressed very often nowadays, and they reach and affect every domain, including the economical one. Implementing an environmental management system will not only help the companies to comply with laws and regulations, but, above all, will offer them an important competitive advantage.

Keywords: environmental management system, environmental reporting, environmental expenses, sustainable development

Procedia PDF Downloads 389
2595 Indian Bankruptcy Code 2016: Impact On Cross-Border Insolvency, an Analysis

Authors: Astha Sinha, Anjali Kanagali

Abstract:

India has been tackling with less than sophisticated legislations when it comes to recovery of debt and bankruptcy situations for a while now. There were multiple overlapping laws and adjudication forums dealing with financial failures and insolvency of companies/individuals in India without really aiding the timely recover of defaulted assets. It remained dicey for businesses to invest in India since there was a lack of legal and institutional machinery for dealing with debt defaults as per the global standards. After much deliberation, the Indian Draft Insolvency code received the presidential assent on May 28, 2016 bringing the Bankruptcy and Insolvency Code, 2016 into existence. The Code is expected to bring about great progress for the country and specifically has the two standout developments. The first is that it calls for resolution of corporate insolvency within a period of 180 days extendable by 90 days hence bringing about security in the minds of investors. Second is that it calls for the creation of a new class of insolvency professionals whose primary function shall be helping sick companies and banks with their takeovers, provides for setting up an Insolvency and Bankruptcy Board to regulate the same and provides for a two stage process of liquidation. The Code is estimated to help India move up its ranking on the World Bank’s ease of doing business index. It is currently ranked at the 130th position lower than some of the sub-saharan African countries. Besides this, however, there are various areas in which the Code falls short such as lack of provisions for aiding the issue of cross-border insolvency, impact on Medium and Small Enterprises in India etc. This paper aims to analyze the provisions of the new Bankruptcy and Insolvency Code, 2016 and its contribution in making India a more desirable location for doing business. It shall also emphasize on the cross-border insolvency issues, practices followed by other countries to resolve the same and the way forward for India to strengthen its Bankruptcy and Insolvency framework.

Keywords: bankruptcy and insolvency code 2016, cross-border insolvency provisions in the 2016 code, Ease of doing business and bankruptcy code, highlights of the new Indian bankruptcy code 2016

Procedia PDF Downloads 246
2594 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis

Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo

Abstract:

The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.

Keywords: IoT, ethical concerns, privacy, safety, security, smart devices

Procedia PDF Downloads 61
2593 Land, History and Housing: Colonial Legacies and Land Tenure in Kuala Lumpur

Authors: Nur Fareza Mustapha

Abstract:

Solutions to policy problems need to be curated to the local context, taking into account the trajectory of the local development path to ensure its efficacy. For Kuala Lumpur, rapid urbanization and migration into the city for the past few decades have increased the demand for housing to accommodate a growing urban population. As a critical factor affecting housing affordability, land supply constraints have been attributed to intensifying market pressures, which grew in tandem with the demands of urban development, along with existing institutional constraints in the governance of land. While demand-side pressures are inevitable given the fixed supply of land, supply-side constraints in regulations distort markets and if addressed inappropriately, may lead to mistargeted policy interventions. Given Malaysia’s historical development, regulatory barriers for land may originate from the British colonial period, when many aspects of the current laws governing tenure were introduced and formalized, and henceforth, became engrained in the system. This research undertakes a postcolonial institutional analysis approach to uncover the causal mechanism driving the evolution of land tenure systems in post-colonial Kuala Lumpur. It seeks to determine the sources of these shifts, focusing on the incentives and bargaining positions of actors during periods of institutional flux/change. It aims to construct a conceptual framework to further this understanding and to elucidate how this historical trajectory affects current access to urban land markets for housing. Archival analysis is used to outline and analyse the evolution of land tenure systems in Kuala Lumpur while stakeholder interviews are used to analyse its impact on the current urban land market, with a particular focus on the provision of and access to affordable housing in the city. Preliminary findings indicate that many aspects of the laws governing tenure that were introduced and formalized during the British colonial period have endured until the present day. Customary rules of tenure were displaced by rules following a European tradition, which found legitimacy through a misguided interpretation of local laws regarding the ownership of land. Colonial notions of race and its binary view of native vs. non-natives have also persisted in the construction and implementation of current legislation regarding land tenure. More concrete findings from this study will generate a more nuanced understanding of the regulatory land supply constraints in Kuala Lumpur, taking into account both the long and short term spatial and temporal processes that affect how these rules are created, implemented and enforced.

Keywords: colonial discourse, historical institutionalism, housing, land policy, post-colonial city

Procedia PDF Downloads 105
2592 Building and Development of the Stock Market Institutional Infrastructure in Russia

Authors: Irina Bondarenko, Olga Vandina

Abstract:

The theory of evolutionary economics is the basis for preparation and application of methods forming the stock market infrastructure development concept. The authors believe that the basis for the process of formation and development of the stock market model infrastructure in Russia is the theory of large systems. This theory considers the financial market infrastructure as a whole on the basis of macroeconomic approach with the further definition of its aims and objectives. Evaluation of the prospects for interaction of securities market institutions will enable identifying the problems associated with the development of this system. The interaction of elements of the stock market infrastructure allows to reduce the costs and time of transactions, thereby freeing up resources of market participants for more efficient operation. Thus, methodology of the transaction analysis allows to determine the financial infrastructure as a set of specialized institutions that form a modern quasi-stable system. The financial infrastructure, based on international standards, should include trading systems, regulatory and supervisory bodies, rating agencies, settlement, clearing and depository organizations. Distribution of financial assets, reducing the magnitude of transaction costs, increased transparency of the market are promising tasks in the solution for questions of services level and quality increase provided by institutions of the securities market financial infrastructure. In order to improve the efficiency of the regulatory system, it is necessary to provide "standards" for all market participants. The development of a clear regulation for the barrier to the stock market entry and exit, provision of conditions for the development and implementation of new laws regulating the activities of participants in the securities market, as well as formulation of proposals aimed at minimizing risks and costs, will enable the achievement of positive results. The latter will be manifested in increasing the level of market participant security and, accordingly, the attractiveness of this market for investors and issuers.

Keywords: institutional infrastructure, financial assets, regulatory system, stock market, transparency of the market

Procedia PDF Downloads 114
2591 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 518
2590 Determinants of Mobile Banking Apps Adoption among Bank Customers in Ghana

Authors: Masud Ibrahim

Abstract:

in Ghana. The sample of the study comprised 450 bank customers from universal banks operating in Ghana. A conceptual framework was framed from a revised TAM model. A total of nine hypotheses were developed and tested using Structural Equation Modeling Technique. Findings from this study revealed that perceived ease of use and perceived usefulness are influenced positively by design and perceived security. Also, perceived ease of use, social influence and perceived security risk were found to have a strong influence on mobile banking app adoption intention. This study provides significant insights and implications for banking organizations on how to ensure the adoption and usage of their mobile banking apps.

Keywords: mobile banking app, perceived ease of use, perceived usefulness, technology acceptance model

Procedia PDF Downloads 134
2589 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges

Authors: Murtala Gada Abubakar, Aliyu T. Umar

Abstract:

A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.

Keywords: basement complex, hydrological processes, Sokoto Basin, water security

Procedia PDF Downloads 291
2588 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 125
2587 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 81
2586 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens

Authors: Michelle D. Hand, Michelle L. Kaiser

Abstract:

African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.

Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu

Procedia PDF Downloads 251