Search results for: unauthorized textures
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 177

Search results for: unauthorized textures

117 Development of an Systematic Design in Evaluating Force-On-Force Security Exercise at Nuclear Power Plants

Authors: Seungsik Yu, Minho Kang

Abstract:

As the threat of terrorism to nuclear facilities is increasing globally after the attacks of September 11, we are striving to recognize the physical protection system and strengthen the emergency response system. Since 2015, Korea has implemented physical protection security exercise for nuclear facilities. The exercise should be carried out with full cooperation between the operator and response forces. Performance testing of the physical protection system should include appropriate exercises, for example, force-on-force exercises, to determine if the response forces can provide an effective and timely response to prevent sabotage. Significant deficiencies and actions taken should be reported as stipulated by the competent authority. The IAEA(International Atomic Energy Agency) is also preparing force-on-force exercise program documents to support exercise of member states. Currently, ROK(Republic of Korea) is implementing exercise on the force-on-force exercise evaluation system which is developed by itself for the nuclear power plant, and it is necessary to establish the exercise procedure considering the use of the force-on-force exercise evaluation system. The purpose of this study is to establish the work procedures of the three major organizations related to the force-on-force exercise of nuclear power plants in ROK, which conduct exercise using force-on-force exercise evaluation system. The three major organizations are composed of licensee, KINAC (Korea Institute of Nuclear Nonproliferation and Control), and the NSSC(Nuclear Safety and Security Commission). Major activities are as follows. First, the licensee establishes and conducts an exercise plan, and when recommendations are derived from the result of the exercise, it prepares and carries out a force-on-force result report including a plan for implementation of the recommendations. Other detailed tasks include consultation with surrounding units for adversary, interviews with exercise participants, support for document evaluation, and self-training to improve the familiarity of the MILES (Multiple Integrated Laser Engagement System). Second, KINAC establishes a force-on-force exercise plan review report and reviews the force-on-force exercise plan report established by licensee. KINAC evaluate force-on-force exercise using exercise evaluation system and prepare training evaluation report. Other detailed tasks include MILES training, adversary consultation, management of exercise evaluation systems, and analysis of exercise evaluation results. Finally, the NSSC decides whether or not to approve the force-on-force exercise and makes a correction request to the nuclear facility based on the exercise results. The most important part of ROK's force-on-force exercise system is the analysis through the exercise evaluation system implemented by KINAC after the exercise. The analytical method proceeds in the order of collecting data from the exercise evaluation system and analyzing the collected data. The exercise application process of the exercise evaluation system introduced in ROK in 2016 will be concretely set up, and a system will be established to provide objective and consistent conclusions between exercise sessions. Based on the conclusions drawn up, the ultimate goal is to complement the physical protection system of licensee so that the system makes licensee respond effectively and timely against sabotage or unauthorized removal of nuclear materials.

Keywords: Force-on-Force exercise, nuclear power plant, physical protection, sabotage, unauthorized removal

Procedia PDF Downloads 140
116 Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion

Authors: Sanaz Kavianpour, Zuraini Ismail, Bharanidharan Shanmugam

Abstract:

Social Network Sites (SNSs) can be served as an invaluable platform to transfer the information across a large number of individuals. A substantial component of communicating and managing information is to identify which individual will influence others in propagating information and also whether dissemination of information in the absence of social signals about that information will be occurred or not. Classifying the final audience of social data is difficult as controlling the social contexts which transfers among individuals are not completely possible. Hence, undesirable information diffusion to an unauthorized individual on SNSs can threaten individuals’ privacy. This paper highlights the information diffusion in SNSs and moreover it emphasizes the most significant privacy issues to individuals of SNSs. The goal of this paper is to propose a privacy-preserving model that has urgent regards with individuals’ data in order to control availability of data and improve privacy by providing access to the data for an appropriate third parties without compromising the advantages of information sharing through SNSs.

Keywords: anonymization algorithm, classification algorithm, information diffusion, privacy, social network sites

Procedia PDF Downloads 319
115 Residual Stresses and Crystallographic Texture of Magnesium AZ31-C Alloy Welded by Friction Stir Welding (FSW)

Authors: A. Kouadri-Henni, L. Barrallier

Abstract:

The objective of the study was to characterize the properties of a magnesium alloy welded by friction stir welding (FSW). The results led to a better understanding of the relationship between this process, the microstructure and anisotropic properties of alloy materials. Welding principally leads to a large reduction in grain size in welded zones due to the phenomenon of dynamic recrystallization. The most remarkable observation was that crystallographic textures changed from a base metal with one texture in two zones: the thermo-mechanically affected and stir welded zones. The latter zone has the peculiarity of possessing a marked texture with two components on the basal plane and the pyramidal plane. These characteristics disappeared in the TMAZ, which had only one component following the basal plane. These modifications have been explained by the nature of the plastic deformation in these zones, which occurs at a moderate temperature in the TMAZ and high temperature in the SWZ. In the same time, we compared this evolution with the nature and the level of the residual stresses obtained by X-ray diffraction.

Keywords: texture christallography, residual stresses, FSW process

Procedia PDF Downloads 365
114 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 297
113 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 240
112 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 90
111 Growth Patterns of Pyrite Crystals Studied by Electron Back Scatter Diffraction (EBSD)

Authors: Kirsten Techmer, Jan-Erik Rybak, Simon Rudolph

Abstract:

Natural formed pyrites (FeS2) are frequent sulfides in sedimentary and metamorphic rocks. Growth textures of idiomorphic pyrite assemblages reflect the conditions during their formation in the geologic sequence, furtheron the local texture analyses of the growth patterns of pyrite assemblages by EBSD reveal the possibility to resolve the growth conditions during the formation of pyrite at the micron scale. The spatial resolution of local texture measurements in the Scanning Electron Microscope used can be in the nanomete scale. Orientation contrasts resulting from domains of smaller misorientations within larger pyrite crystals can be resolved as well. The electron optical studies have been carried out in a Field-Emission Scanning Electron Microscope (FEI Quanta 200) equipped with a CCD camera to study the orientation contrasts along the surfaces of pyrite. Idiomorphic cubic single crystals of pyrite, polycrystalline assemblages of pyrite, spherically grown spheres of pyrite as well as pyrite-bearing ammonites have been studied by EBSD in the Scanning Electron Microscope. Samples were chosen to show no or minor secondary deformation and an idiomorphic 3D crystal habit, so the local textures of pyrite result mainly from growth and minor from deformation. The samples studied derived from Navajun (Spain), Chalchidiki (Greece), Thüringen (Germany) and Unterkliem (Austria). Chemical analyses by EDAX show pyrite with minor inhomogeneities e.g., single crystals of galena and chalcopyrite along the grain boundaries of larger pyrite crystals. Intergrowth between marcasite and pyrite can be detected in one sample. Pyrite may form intense growth twinning lamellae on {011}. Twinning, e.g., contact twinning is abundant within the crystals studied and the individual twinning lamellaes can be resolved by EBSD. The ammonites studied show a replacement of the shale by newly formed pyrite resulting in an intense intergrowth of calcite and pyrite. EBSD measurements indicate a polycrystalline microfabric of both minerals, still reflecting primary surface structures of the ammonites e.g, the Septen. Discs of pyrite (“pyrite dollar”) as well as pyrite framboids show growth patterns comprising a typical microfabric. EBSD studies reveal an equigranular matrix in the inner part of the discs of pyrite and a fiber growth with larger misorientations in the outer regions between the individual segments. This typical microfabric derived from a formation of pyrite crystals starting at a higher nucleation rate and followed by directional crystal growth. EBSD studies show, that the growth texture of pyrite in the samples studied reveals a correlation between nucleation rate and following growth rate of the pyrites, thus leading to the characteristic crystal habits. Preferential directional growth at lower nucleation rates may lead to the formation of 3D framboids of pyrite. Crystallographic misorientations between the individual fibers are similar. In ammonites studied, primary anisotropies of the substrates like e.g., ammonitic sutures, influence the nucleation, crystal growth and habit of the newly formed pyrites along the surfaces.

Keywords: Electron Back Scatter Diffraction (EBSD), growth pattern, Fe-sulfides (pyrite), texture analyses

Procedia PDF Downloads 292
110 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 267
109 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 389
108 Combating Illegal Logging in Malaysia: Policies and Strategies under National Forestry Act (NFA) 1984

Authors: Muhammad Nur Haniff Mohd Noor, Rokiah Kadir, Suriyani Muhamad

Abstract:

The National Forestry Act (NFA) 1984 is the primary forest law that regulates forest-related activities in Peninsular Malaysia. In the 1990s, abundance of illegal logging cases have called for legislative reform of the NFA 1984. As a result, NFA 1984 was amended in 1993 with the principal goal of controlling illegal forest encroachment in the forms of illegal logging, unauthorized harvesting, unlicensed forest settlement and other forms of unlawful activities. At a conceptual level, this paper discusses the policies and strategies implemented under the NFA 1984 (Amendment 1993) that are dedicated to overcome illegal logging. Then, the policies and strategies employed are reviewed and evaluated. Next, this paper conceptually discusses the loopholes of NFA 1984 (Amendment 1993) in relation to aspects where the regulation is considered insufficient to curb illegal logging. In the final section, vital actions and suggested improvements to improve the overall effectiveness of NFA 1984 (Amendment 1993) are examined.

Keywords: forest law and regulation, illegal logging, National Forestry Act 1984, NFA 1984, Amendment 1993, Peninsular Malaysia

Procedia PDF Downloads 258
107 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 299
106 Childhood Sensory Sensitivity: A Potential Precursor to Borderline Personality Disorder

Authors: Valerie Porr, Sydney A. DeCaro

Abstract:

TARA for borderline personality disorder (BPD), an education and advocacy organization, helps families to compassionately and effectively deal with troubling BPD behaviors. Our psychoeducational programs focus on understanding underlying neurobiological features of BPD and evidence-based methodology integrating dialectical behavior therapy (DBT) and mentalization based therapy (MBT,) clarifying the inherent misunderstanding of BPD behaviors and improving family communication. TARA4BPD conducts online surveys, workshops, and topical webinars. For over 25 years, we have collected data from BPD helpline callers. This data drew our attention to particular childhood idiosyncrasies that seem to characterize many of the children who later met the criteria for BPD. The idiosyncrasies we observed, heightened sensory sensitivity and hypervigilance, were included in Adolf Stern’s 1938 definition of “Borderline.” This aspect of BPD has not been prioritized by personality disorder researchers, presently focused on emotion processing and social cognition in BPD. Parents described sleep reversal problems in infants who, early on, seem to exhibit dysregulation in circadian rhythm. Families describe children as supersensitive to sensory sensations, such as specific sounds, heightened sense of smell, taste, textures of foods, and an inability to tolerate various fabrics textures (i.e., seams in socks). They also exhibit high sensitivity to particular words and voice tones. Many have alexithymia and dyslexia. These children are either hypo- or hypersensitive to sensory sensations, including pain. Many suffer from fibromyalgia. BPD reactions to pain have been studied (C. Schmahl) and confirm the existence of hyper and hypo-reactions to pain stimuli in people with BPD. To date, there is little or no data regarding what comprises a normative range of sensitivity in infants and children. Many parents reported that their children were tested or treated for sensory processing disorder (SPD), learning disorders, and ADHD. SPD is not included in the DSM and is treated by occupational therapists. The overwhelming anecdotal data from thousands of parents of children who later met criteria for BPD led TARA4BPD to develop a sensitivity survey to develop evidence of the possible role of early sensory perception problems as a pre-cursor to BPD, hopefully initiating new directions in BPD research. At present, the research community seems unaware of the role supersensory sensitivity might play as an early indicator of BPD. Parents' observations of childhood sensitivity obtained through family interviews and results of an extensive online survey on sensory responses across various ages of development will be presented. People with BPD suffer from a sense of isolation and otherness that often results in later interpersonal difficulties. Early identification of supersensitive children while brain circuits are developing might decrease the development of social interaction deficits such as rejection sensitivity, self-referential processes, and negative bias, hallmarks of BPD, ultimately minimizing the maladaptive methods of coping with distress that characterizes BPD. Family experiences are an untapped resource for BPD research. It is hoped that this data will give family observations the critical credibility to inform future treatment and research directions.

Keywords: alexithymia, dyslexia, hypersensitivity, sensory processing disorder

Procedia PDF Downloads 201
105 Disidentification of Historical City Centers: A Comparative Study of the Old and New Settlements of Mardin, Turkey

Authors: Fatma Kürüm Varolgüneş, Fatih Canan

Abstract:

Mardin is one of the unique cities in Turkey with its rich cultural and historical heritage. Mardin’s traditional dwellings have been affected both by natural data such as climate and topography and by cultural data like lifestyle and belief. However, in the new settlements, housing is formed with modern approaches and unsuitable forms clashing with Mardin’s culture and environment. While the city is expanding, traditional textures are ignored. Thus, traditional settlements are losing their identity and are vanishing because of the rapid change and transformation. The main aim of this paper is to determine the physical and social data needed to define the characteristic features of Mardin’s old and new settlements. In this context, based on social and cultural data, old and new settlement formations of Mardin have been investigated from various aspects. During this research, the following methods have been utilized: observations, interviews, public surveys, literature review, as well as site examination via maps, photographs and questionnaire methodology. In conclusion, this paper focuses on how changes in the physical forms of cities affect the typology and the identity of cities, as in the case of Mardin.

Keywords: urban and local identity, historical city center, traditional settlements, Mardin

Procedia PDF Downloads 327
104 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 434
103 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 130
102 Origin of the Eocene Volcanic Rocks in Muradlu Village, Azerbaijan Province, Northwest of Iran

Authors: A. Shahriari, M. Khalatbari Jafari, M. Faridi

Abstract:

Abstract The Muradlu volcanic area is located in Azerbaijan province, NW Iran. The studied area exposed in a vast region includes lesser Caucasus, Southeastern Turkey, and northwestern Iran, comprising Cenozoic volcanic and plutonic massifs. The geology of this extended region was under the influence of the Alpine-Himalayan orogeny. Cenozoic magmatic activities in this vast region evolved through the northward subduction of the Neotethyan subducted slab and subsequence collision of the Arabian and Eurasian plates. Based on stratigraphy and paleontology data, most of the volcanic activities in the Muradlu area occurred in the Eocene period. The Studied volcanic rocks overly late Cretaceous limestone with disconformity. The volcanic sequence includes thick epiclastic and hyaloclastite breccia at the base, laterally changed to pillow lava and continued by hyaloclastite and lave flows at the top of the series. The lava flows display different textures from megaporphyric-phyric to fluidal and microlithic textures. The studied samples comprise picrobasalt basalt, tephrite basanite, trachybasalt, basaltic trachyandesite, phonotephrite, tephrophonolite, trachyandesite, and trachyte in compositions. Some xenoliths with lherzolitic composition are found in picrobasalt. These xenoliths are made of olivine, cpx (diopside), and opx (enstatite), probably the remain of mantle origin. Some feldspathoid minerals such as sodalite presence in the phonotephrite confirm an alkaline trend. Two types of augite phenocrysts are found in picrobasalt, basalt and trachybasalt. The first types are shapeless, with disharmony zoning and sponge texture with reaction edges probably resulted from sodic magma, which is affected by a potassic magma. The second shows a glomerocryst shape. In discriminative diagrams, the volcanic rocks show alkaline-shoshonitic trends. They contain (0.5-7.7) k2O values and plot in the shoshonitic field. Most of the samples display transitional to potassic alkaline trends, and some samples reveal sodic alkaline trends. The transitional trend probably results from the mixing of the sodic alkaline and potassic magmas. The Rare Earth Elements (REE) patterns and spider diagrams indicate enrichment of Large-Ione Lithophile Element (LILE) and depletion of High Field Strength Elements (HFSE) relative to Heavy Rare Earth Elements (HREE). Enrichment of K, Rb, Sr, Ba, Zr, Th, and U and the enrichment of Light Rare Earth Elements (LREE) relative to Heavy Rare Earth Elements (HREE) indicate the effect of subduction-related fluids over the mantle source, which has been reported in the arc and continental collision zones. The studied samples show low Nb/La ratios. Our studied samples plot in the lithosphere and lithosphere-asthenosphere fields in the Nb/La versus La/Yb ratios diagram. These geochemical characters allow us to conclude that a lithospheric mantle source previously metasomatized by subduction components was the origin of the Muradlu volcanic rocks.

Keywords: alkaline, asthenosphere, lherzolite, lithosphere, Muradlu, potassic, shoshonitic, sodic, volcanism

Procedia PDF Downloads 169
101 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 254
100 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 129
99 Synthesis and Characterization of Mass Catalysts Based on Cobalt and Molybdenum

Authors: Nassira Ouslimani

Abstract:

The electronic structure of transition metals gives them many catalytic possibilities in many types of reactions, particularly cobalt and molybdenum. It is in this context that this study is part of the synthesis and characterization of mass catalysts based on cobalt and molybdenum Co1₋xMoO4 (X=0 and X=0.5 and X=1). The two catalysts were prepared by Co-precipitation using ammonia as a precipitating agent and one by precipitation. The samples obtained were analyzed by numerous physic-chemical analysis techniques: ATG-ATD-DSC, DRX-HT, SEM-EDX, and the elemental composition of the catalysts was verified by SAA as well as the FTIR. The ATG-DSC shows a mass loss for all the catalysts of approximately 8%, corresponding to the loss of water and the decomposition of nitrates. The DRX-HT analysis allows the detection of the two CoMoO4 phases with diffraction peaks which increase with the increase in temperature. The results of the FTIR analysis made it possible to highlight the vibration modes of the bonds of the structure of the prepared catalysts. The SEM images of the solids show very different textures with almost homogeneous surfaces with a more regular particle size distribution and a more defined grain shape. The EDX analysis showed the presence of the elements Co, Mo, and O in proportions very close to the nominal proportions. Finally, the actual composition, evaluated by SAA, is close to the theoretical composition fixed during the preparation. This testifies to the good conditions for the preparation of the catalysts by the co-precipitation method.

Keywords: catalytic, molybdenum, coprecipitation, cobalt, ammonia

Procedia PDF Downloads 89
98 Design of Reconfigurable and Non-reciprocal Metasurface with Independent Controls of Transmission Gain, Attenuation and Phase

Authors: Shi Yu Wang, Qian Wei Zhang, He Li, Hao Han He, Yun Bo Li

Abstract:

The spatial controls of electromagnetic (EM) waves have always been a research hot spot in recent years. And the rapid development of metasurface-based technologies has provided more freedoms for manipulating the EM waves. Here we propose the design of reconfigurable and non-reciprocal metasurface with independent controls of transmission gain, attenuation and phase. The proposed meta-atom mainly consists of the cascaded textures including the receiving antenna, the middle layer in which the power amplifiers (PAs), programmable attenuator and phase shifter locate, and the transmitting antenna. The programmable attenuator and phase shifter can realize the dynamic controls of transmission amplitude and phase independently, and the PA devices in the meta-atom can actualize the performance of non-reciprocal transmission. The proposed meta-atom is analyzed applying field-circuit co-simulation and a sample of the meta-atom is fabricated and measured under using two standard waveguides. The measured results verify the ability of the independent manipulation for transmission amplitude and phase of the proposed the meta-atom and the design method has been verified very well correspondingly.

Keywords: active circuits, independent controls of multiple electromagnetic features, non-reciprocal electromagnetic transmission, reconfigurable and programmable

Procedia PDF Downloads 76
97 Discrete Element Method Simulation of Crushable Pumice Sand

Authors: Sayed Hessam Bahmani, Rolsndo P. Orense

Abstract:

From an engineering point of view, pumice particles are problematic because of their crushability and compressibility due to their vesicular nature. Currently, information on the geotechnical characteristics of pumice sands is limited. While extensive empirical and laboratory tests can be implemented to characterize their behavior, these are generally time-consuming and expensive. These drawbacks have motivated attempts to study the effects of particle breakage of pumice sand through the Discrete Element Method (DEM). This method provides insights into the behavior of crushable granular material at both the micro and macro-level. In this paper, the results of single-particle crushing tests conducted in the laboratory are simulated using DEM through the open-source code YADE. This is done to better understand the parameters necessary to represent the pumice microstructure that governs its crushing features, and to examine how the resulting microstructure evolution affects a particle’s properties. The DEM particle model is then used to simulate the behavior of pumice sand during consolidated drained triaxial tests. The results indicate the importance of incorporating particle porosity and unique surface textures in the material characterization and show that interlocking between the crushed particles significantly influences the drained behavior of the pumice specimen.

Keywords: pumice sand, triaxial compression, simulation, particle breakage

Procedia PDF Downloads 242
96 Effective Urban Design on Environmental Quality Improvement of Historical Textures: A Case Study on Khajeh Khezr Neighborhood in Kerman City

Authors: Saman Sobhani

Abstract:

Historical neighborhoods have special values inside them, and, in addition to inducing a sense of collective memories, they have to have some criteria in respect of achieving desirable environmental quality in order for citizens to live. From the perspective of urban planners and designers, a neighborhood as an urban space has to satisfy various needs of citizens in terms of activities as well as their spiritual requirements. In the research based on the component of environmental quality in one of the neighborhoods with historical value resulting from the theoretical model presented (functional-structural, physical-spatial, and substantive), integrated analysis has been performed on the Khajeh Khezr neighborhood in Kerman. Then, after studying the weaknesses and strengths points of it based on the AIDA model, some mechanisms have been presented to promote environmental quality based on neighborhood organization, and related urban design projects have been defined accordingly. Analyzing the findings shows that inhabitants in the Khajeh Khezr neighborhood are not much satisfied with the quality of the urban environment of the neighborhood. In the research, the descriptive-analytical method and review of texts have been used in the form of library studies, and case study has been applied as well as observation and questionnaire in the form of field studies.

Keywords: environmental quality, Kerman, Khajeh Khezr, neighborhood

Procedia PDF Downloads 83
95 Urban Transformation as a Process for Inner-City Slums in Turkey the Experience of Gaziantep City, Turkey

Authors: Samer Katerji, Mustafa Ozakça, Esra Demircioğlu

Abstract:

The inner-city slums become a global phenomenon problem. It is widely distributed in separate zones through the urban textures, threatens cities in physical, economic and social aspects. It often has illegal settlements with unsafe and unhealthy conditions. By the time, it grown up rapidly followed by growing in its problems. According to United Nations, in some cities, up to 80 percent of the population lives in slums. Fifty-five million new slum dwellers have been added to the global population since 2000. Both developed and developing countries started to figure out mechanics to find solutions, which is suitable to solve the inner-city slums problems. In turn, the planning agenda of Turkey has been focused on urban transformation as a solution for inner-city slums problems since the 2000s. The current laws after 2004 changed all of the statements on the urban transformation of the country. This paper come to explain the urban transformation approach as qualified presses in dealing with inner-city slums problems of turkey. After that, it highlights one of the earliest ongoing transformation projects in Gaziantep city, which is adopted by the local municipalities. The study includes assessment of the pros and cons of pursuing the project and identifying the potential consequences. This is more likely to keep up with the efforts of Gaziantep Municipality in developing and transforming slum areas.

Keywords: transformation, urban, slums, Gaziantep

Procedia PDF Downloads 498
94 Analysis of User Complaints and Preferences by Conducting User Surveys to Ascertain the Need for Change in Current Design of Helmets

Authors: Pratham Baheti, Rohan Sanghi, Aditya Gupta

Abstract:

In the largely populated city of New Delhi, India, there are a lot of people that travel by two-wheelers. Majority of the people wear helmets while traveling and know how important it is to wear helmets for their safety. Still, the number of deaths because of road accidents involving two-wheelers is significant. We had conducted a survey by traveling within and in the outskirts of Delhi so as to see the variation in data and in the opinion of people towards helmet being a safety device rather than to escape the traffic police. We conducted a survey at traffic junctions and crossings of all the stakeholders and collected feedback on the Helmet scenario in India. According to the survey, the possible reason for these deaths is that the people, being unaware of helmet safety standards (ISI standards for helmets), buy helmets with fake ISI mark from unauthorized helmet sellers for a cheap price. Also, for the people who do not wear a helmet at all or wear a helmet just because it is a law, the reasons that they do not want to wear a helmet is heavyweight, lack of ventilation, inconvenience due to a strap, and hair problems. To address all these problems, we are designing a helmet with reduced weight and also working on the Helmet’s retention system and ventilation. We plan to provide this product at a cheap cost whilst maintaining the ISI standards so that a larger section of the population would be able to afford the helmet.

Keywords: safety, survey, ISI marks, stakeholders, helmet

Procedia PDF Downloads 277
93 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 263
92 Biological Soil Crust Effects on Dust Control Around the Urmia Lake

Authors: Abbas Ahmadi, Nasser Aliasgharzad, Ali Asghar Jafarzadeh

Abstract:

Nowadays, drying of the Urmia Lake as a largest saline lake in the world and emerging its saline bed from water has caused the risk of salty dune storms, which threats the health of human society and also plants and animal communities living in the region. Biological soil crusts (BSCs) as a dust stabilizer attracted the attention of Soil conservation experts in recent years. Although the presence of water by the impenetrable lake bed and endorheic basin can be an advantage to create BSCs, but the extraordinary of the lake bed salinity is a factor for prevention of its establishment in the region. Therefore, the present research work has been carried out to investigate the effects of inoculating the Cyanobacteria, algae and their combination to create BSCs for dust control. In this study, an algae attributed to Chlamydomonas sp and a cyanobacteria attributed to Anabaena sp isolated from the soils of Urmia Lake margin were used to create BSC in four soil samples which collected from 0-10 cm of the current margin (A), the previous bed (B), affected lands by lake (C) and Quomtappe sand dune (D). The main characteristics of the A, B and C soil samples are their highly salinity (their ECe are 108, 140 and 118 dS/m, respectively) and sodicity. Also, texture class of the soil A was loamy sand, and other two soils had clay textures. Soil D was Non-saline, but it was sodic with a sandy texture class. This study was conducted separately in each soil in a completely randomized design under four inoculation treatments of non-inoculated (T0), Algae (T1), cyanobacteria (T2) and equal mixture of algae and cyanobacteria (T3) with three replications. In the experiment, the soil was placed into wind tunnel trays, and a suspension containing microorganisms mixed with the trays surface soil. During the experiment, water was sprayed to the trays at the morning and evening of every day. After passing the incubation period (30 days), some characteristics of samples such as pH, EC, cold water extractable carbohydrate (CWEC), hot water extractable carbohydrate (HWEC), sulfuric acid extractable carbohydrate (SAEC), organic matter, crust thickness, penetration resistance, wind erosion threshold velocity and soil loss in the wind tunnel were measured, and Correlation between the measured characteristics was obtained through the SPSS software. Analysis of variance and so comparison between the means of treatments were analyzed with MSTATC software. In this research, Chlorophyll, an amount, was used as an indicator of the microorganism's population in the samples. Based on obtained results, the amount of Chlorophyll a in the T2 treatment of soil A and all treatments of soil D was significantly increased in comparison to the control and crust thickness showed increase in all treatments by microorganism’s inoculation. But effect of the treatments was significant in soils A and D. At all treatment’s inoculation of microorganisms in soil A caused to increase %46, %34 and %55 of the wind erosion threshold velocity in T1, T2 and T3 treatments in comparison to the control, respectively, and in soil D all treatments caused wind erosion threshold velocity became two times more than control. However, soil loss in the wind tunnel experiments was significant in T2 and T3 treatments of these soils and T1 treatment had no effect in reducing soil loss. Correlation between Chlorophyll a and salinity shows the important role of salinity in microbial growth prevention and formation of BSCs in the studied samples. In general, according to the obtained results, it can be concluded that salinity reduces the growth of microorganisms in saline soils of the region, and in soils with fine textures, salinity role in prevention of the microbial growth is clear. Also, using the mix of algae and cyanobacteria together caused the synergistic growth of them and consequently, better protection of the soil against wind erosion was provided.

Keywords: wind erosion, algae, cyanobacteria, carbohydrate

Procedia PDF Downloads 61
91 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 266
90 Properties of Bacterial Nanocellulose for Scenic Arts

Authors: Beatriz Suárez López, Gabriela Forman

Abstract:

Kombucha (a symbiotic culture of bacteria and yeast) produces material capable of acquiring multiple shapes and textures that change significantly under different environment or temperature variations (e.g., when it is exposed to wet conditions), properties that may be explored in the scenic industry. This paper presents an analysis of its specific characteristics, exploring them as a non-conventional material for arts and performance. Costume Design uses surfaces as a powerful way of expression to represent concepts and stories; it may apply the unique features of nano bacterial cellulose (NBC) as assets in this artistic context. A mix of qualitative and quantitative (interventionist) methodology approaches were used -review of relevant literature to deepen knowledge on the research topic (crossing bibliography from different fields of studies: Biology, Art, Costume Design, etc.); as well as descriptive methods: laboratorial experiments, document quantities, observation to identify material properties and possibilities used to express a multiple narrative ideas, concepts and feelings. The results confirmed that NBC is an interactive and versatile material viable to be used in an alternative scenic context; its unique aesthetic and performative qualities, which change in contact to moisture, is a resource that can be used to show a visual and poetic impact on stage.

Keywords: biotechnological materials, contemporary dance, costume design, nano bacterial cellulose, performing arts

Procedia PDF Downloads 100
89 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz

Authors: Homa Parmoon, Narges Hamzeh

Abstract:

Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.

Keywords: social security, damaged area, two-way ANOVA, Shiraz

Procedia PDF Downloads 137
88 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 177