Search results for: data security architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27971

Search results for: data security architecture

27101 Flow Conservation Framework for Monitoring Software Defined Networks

Authors: Jesús Antonio Puente Fernández, Luis Javier Garcia Villalba

Abstract:

New trends on streaming videos such as series or films require a high demand of network resources. This fact results in a huge problem within traditional IP networks due to the rigidity of its architecture. In this way, Software Defined Networks (SDN) is a new concept of network architecture that intends to be more flexible and it simplifies the management in networks with respect to the existing ones. These aspects are possible due to the separation of control plane (controller) and data plane (switches). Taking the advantage of this separated control, it is easy to deploy a monitoring tool independent of device vendors since the existing ones are dependent on the installation of specialized and expensive hardware. In this paper, we propose a framework that optimizes the traffic monitoring in SDN networks that decreases the number of monitoring queries to improve the network traffic and also reduces the overload. The performed experiments (with and without the optimization) using a video streaming delivery between two hosts demonstrate the feasibility of our monitoring proposal.

Keywords: optimization, monitoring, software defined networking, statistics, query

Procedia PDF Downloads 331
27100 Adopting Cloud-Based Techniques to Reduce Energy Consumption: Toward a Greener Cloud

Authors: Sandesh Achar

Abstract:

The cloud computing industry has set new goals for better service delivery and deployment, so anyone can access services such as computation, application, and storage anytime. Cloud computing promises new possibilities for approaching sustainable solutions to deploy and advance their services in this distributed environment. This work explores energy-efficient approaches and how cloud-based architecture can reduce energy consumption levels amongst enterprises leveraging cloud computing services. Adopting cloud-based networking, database, and server machines provide a comprehensive means of achieving the potential gains in energy efficiency that cloud computing offers. In energy-efficient cloud computing, virtualization is one aspect that can integrate several technologies to achieve consolidation and better resource utilization. Moreover, the Green Cloud Architecture for cloud data centers is discussed in terms of cost, performance, and energy consumption, and appropriate solutions for various application areas are provided.

Keywords: greener cloud, cloud computing, energy efficiency, energy consumption, metadata tags, green cloud advisor

Procedia PDF Downloads 85
27099 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance

Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz

Abstract:

The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.

Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor

Procedia PDF Downloads 69
27098 Root System Architecture Analysis of Sorghum Genotypes and Its Effect on Drought Adaptation

Authors: Hailemariam Solomon, Taye Tadesse, Daniel Nadew, Firezer Girma

Abstract:

Sorghum is an important crop in semi-arid regions and has shown resilience to drought stress. However, recurrent drought is affecting its productivity. Therefore, it is necessary to explore genes that contribute to drought stress adaptation to increase sorghum productivity. The aim of this study is to evaluate and determine the effect of root system traits, specifically root angle, on drought stress adaptation and grain yield performance in sorghum genotypes. A total of 428 sorghum genotypes from the Ethiopian breeding program were evaluated in three drought-stress environments. Field trials were conducted using a row-column design with three replications. Root system traits were phenotyped using a high-throughput phenotyping platform and analyzed using a row-column design with two replications. Data analysis was performed using R software and regression analysis. The study found significant variations in root system architecture among the sorghum genotypes. Non-stay-green genotypes had a grain yield ranging from 1.63 to 3.1 tons/ha, while stay-green genotypes had a grain yield ranging from 2.4 to 2.9 tons/ha. The analysis of root angle showed that non-stay-green genotypes had an angle ranging from 8.0 to 30.5 degrees, while stay-green genotypes had an angle ranging from 12.0 to 29.0 degrees. Improved varieties exhibited angles between 14.04 and 19.50 degrees. Positive and significant correlations were observed between leaf areas and shoot dry weight, as well as between leaf width and shoot dry weight. Negative correlations were observed between root angle and leaf area, as well as between root angle and root length. This research highlights the importance of root system architecture, particularly root angle traits, in enhancing grain yield production in drought-stressed conditions. It also establishes an association between root angle and grain yield traits for maximizing sorghum productivity.

Keywords: roor sysytem architecture, root angle, narrow root angle, wider root angle, drought

Procedia PDF Downloads 75
27097 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa

Authors: Blessings Masuku

Abstract:

This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.

Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance

Procedia PDF Downloads 62
27096 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 137
27095 The Continuing Saga of Poverty Reduction and Food Security in the Philippines

Authors: Shienna Marie Esteban

Abstract:

The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.

Keywords: agriculture, food security, policy, poverty

Procedia PDF Downloads 311
27094 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 299
27093 A Study of Safety of Data Storage Devices of Graduate Students at Suan Sunandha Rajabhat University

Authors: Komol Phaisarn, Natcha Wattanaprapa

Abstract:

This research is a survey research with an objective to study the safety of data storage devices of graduate students of academic year 2013, Suan Sunandha Rajabhat University. Data were collected by questionnaire on the safety of data storage devices according to CIA principle. A sample size of 81 was drawn from population by purposive sampling method. The results show that most of the graduate students of academic year 2013 at Suan Sunandha Rajabhat University use handy drive to store their data and the safety level of the devices is at good level.

Keywords: security, safety, storage devices, graduate students

Procedia PDF Downloads 353
27092 Emerging Trends of Geographic Information Systems in Built Environment Education: A Bibliometric Review Analysis

Authors: Kiara Lawrence, Robynne Hansmann, Clive Greentsone

Abstract:

Geographic Information Systems (GIS) are used to store, analyze, visualize, capture and monitor geographic data. Built environment professionals as well as urban planners specifically, need to possess GIS skills to effectively and efficiently plan spaces. GIS application extends beyond the production of map artifacts and can be applied to relate to spatially referenced, real time data to support spatial visualization, analysis, community engagement, scenarios, and so forth. Though GIS has been used in the built environment for a few decades, its use in education has not been researched enough to draw conclusions on the trends in the last 20 years. The study looks to discover current and emerging trends of GIS in built environment education. A bibliometric review analysis methodology was carried out through exporting documents from Scopus and Web of Science using keywords around "Geographic information systems" OR "GIS" AND "built environment" OR “geography” OR "architecture" OR "quantity surveying" OR "construction" OR "urban planning" OR "town planning" AND “education” between the years 1994 to 2024. A total of 564 documents were identified and exported. The data was then analyzed using VosViewer software to generate network analysis and visualization maps on the co-occurrence of keywords, co-citation of documents and countries and co-author network analysis. By analyzing each aspect of the data, deeper insight of GIS within education can be understood. Preliminary results from Scopus indicate that GIS research focusing on built environment education seems to have peaked prior to 2014 with much focus on remote sensing, demography, land use, engineering education and so forth. This invaluable data can help in understanding and implementing GIS in built environment education in ways that are foundational and innovative to ensure that students are equipped with sufficient knowledge and skills to carry out tasks in their respective fields.

Keywords: architecture, built environment, construction, education, geography, geographic information systems, quantity surveying, town planning, urban planning

Procedia PDF Downloads 15
27091 Visual Analysis of Picturesque Urban Landscape Case of Sultanahmet, Istanbul

Authors: Saidu Dalhat Dansadau, Aykut Karaman

Abstract:

The integration of photography into architecture was a pivotal point in the journey of architectural representation; photography proved itself useful for the betterment of architecture early on, as well as established itself as a necessary tool in the realm of architecture. The main study this paper was extracted from looked into the inquiry of knowing exactly what are the key picturesque locations/structures in Sultanahmet, Fatih-Istanbul, and how can their spatial distribution and cultural significance be characterized and mapped for urban design and development as well as the secondary objective, of which this paper focuses on, is to “Investigate the role of perception in urban environments and how photography serves as a tool for capturing and conveying the perception of Sultanahmet's picturesque structures/locations”. The study achieved these objectives by utilizing methodologies such as geo-tagged photography, sequential photography, social media metadata extraction, GIS mapping, spatial analysis, and visual analysis, focusing on the historically rich and culturally significant study area of Sultanahmet, Fatih-Istanbul. By looking at potential structures/locations and then dissecting their special distribution and cultural significance, the main study was able to achieve the main objective as well as unveil a more nuanced understanding of the dynamics between photography, architecture, and urban design with respect to perception using sequential photography.

Keywords: perception, architectural photography, picturesque, urban design, Sultanahmet, Istanbul

Procedia PDF Downloads 45
27090 Li-Fi Technology: Data Transmission through Visible Light

Authors: Shahzad Hassan, Kamran Saeed

Abstract:

People are always in search of Wi-Fi hotspots because Internet is a major demand nowadays. But like all other technologies, there is still room for improvement in the Wi-Fi technology with regards to the speed and quality of connectivity. In order to address these aspects, Harald Haas, a professor at the University of Edinburgh, proposed what we know as the Li-Fi (Light Fidelity). Li-Fi is a new technology in the field of wireless communication to provide connectivity within a network environment. It is a two-way mode of wireless communication using light. Basically, the data is transmitted through Light Emitting Diodes which can vary the intensity of light very fast, even faster than the blink of an eye. From the research and experiments conducted so far, it can be said that Li-Fi can increase the speed and reliability of the transfer of data. This paper pays particular attention on the assessment of the performance of this technology. In other words, it is a 5G technology which uses LED as the medium of data transfer. For coverage within the buildings, Wi-Fi is good but Li-Fi can be considered favorable in situations where large amounts of data are to be transferred in areas with electromagnetic interferences. It brings a lot of data related qualities such as efficiency, security as well as large throughputs to the table of wireless communication. All in all, it can be said that Li-Fi is going to be a future phenomenon where the presence of light will mean access to the Internet as well as speedy data transfer.

Keywords: communication, LED, Li-Fi, Wi-Fi

Procedia PDF Downloads 347
27089 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 81
27088 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia

Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa

Abstract:

Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.

Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain

Procedia PDF Downloads 339
27087 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 519
27086 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 203
27085 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems

Authors: Wu You, Burra Venkata Durga Kumar

Abstract:

This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.

Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security

Procedia PDF Downloads 93
27084 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 293
27083 Traditional and New Residential Architecture in the Approach of Sustainability in the Countryside after the Earthquake

Authors: Zeynep Tanriverdi̇

Abstract:

Sustainable architecture is a design approach that provides healthy, comfortable, safe, clean space production as well as utilizes minimum resources for efficient and economical use of natural resources and energy. Traditional houses located in rural areas are sustainable structures built at the design and implementation stage in accordance with the climatic environmental data of the region and also effectively using natural energy resources. The fact that these structures are located in an earthquake geography like Türkiye brings their earthquake resistance to the agenda. Since the construction of these structures, which contain the architectural and technological cultural knowledge of the past, is shaped according to the characteristics of the regions where they are located, their resistance to earthquakes also differs. Analyses in rural areas after the earthquake show that there are light-damaged structures that can survive, severely damaged structures, and completely destroyed structures. In this regard, experts can implement repair, consolidation, and reconstruction applications, respectively. While simple repair interventions are carried out in accordance with the original data in traditional houses that have shown great resistance to earthquakes, reinforcement work blended with new technologies can be applied in damaged structures. In reconstruction work, a wide variety of applications can be seen with the possibilities of modern technologies. In rural areas experiencing earthquakes around the world, there are experimental new housing applications that are renewable, environmentally friendly, and sustainable with modern construction techniques in the light of scientific data. With these new residences, it is aimed to create earthquake-resistant, economical, healthy, and pain-relieving therapy spaces for people whose daily lives have been interrupted by disasters. In this study, the preservation of high earthquake-prone rural areas will be discussed through the knowledge transfer of traditional architecture and also permanent housing practices using new sustainable technologies to improve the area. In this way, it will be possible to keep losses to a minimum with sustainable, reliable applications prepared for the worst aspects of the disaster situation and to establish a link between the knowledge of the past and the new technologies of the future.

Keywords: sustainability, conservation, traditional construction systems and materials, new technologies, earthquake resistance

Procedia PDF Downloads 65
27082 Product Architecture and Production Process of Battery Modules from Prismatic Lithium-Ion-Battery Cells

Authors: Achim Kampker, Heiner Hans Heimes, Nemanja Sarovic, Jan-Philip Ganser, Saskia Wessel, Christoph Lienemann

Abstract:

The electrification of the power train is a fundamental technical transition in the automotive industry and poses a major challenge for established car companies. Providing the traction energy, requiring an ever greater amount of space within the car and having a high share of value-add the lithium-ion battery is a central component of the electric power train and a completely new component to car manufacturers at the same time. Being relatively new to the automotive industry, the current design of the product architecture and production process (including manufacturing and assembling processes) of lithium-ion battery modules do not allow for an easy and cost-efficient disassembly or product design change. Yet these two requirements will increase in importance with rising sales volumes of electric cars in the near future and need to be addressed for the electric car to be competitive with conventional power train systems. This paper focuses on the current product architecture and production process of common automotive battery modules from prismatic lithium-ion battery cells to derive impacts for a remanufacturing concept. The information necessary for this purpose were gathered by literature research, patent inquiries, industry expert interviews and first-hand experiences of the authors. On the basis of these results, the underlying causes for the design´s lack of remanufacturability and flexibility with regards to product design changes are examined. In all, this paper gives an extensive and detailed overview of the state of the art of the product architecture and production process of lithium-ion battery modules from prismatic battery cells, identifies its deficiencies and derives improvement measures.

Keywords: battery module, prismatic lithium-ion battery cell, product architecture, production process, remanufacturing, flexibility

Procedia PDF Downloads 267
27081 Investigation of Thermal Comfort Conditions of Vernacular Buildings Taking into Consideration Various Use Patterns: A Case Study

Authors: Christina Kalogirou

Abstract:

The main goal of this paper is to explore the thermal comfort conditions in traditional buildings during all seasons of the year taking into consideration various use patterns. For this purpose a dwelling of vernacular architecture is selected and data regarding the indoor and outdoor air and surface temperature as well as the relative humidity are collected. These measurements are conducted in situ during the period of a year. Also, this building is occupied periodically and a calendar of occupancy was kept (duration of residence, hours of heating system operation, hours of natural ventilation, etc.) in order to correlate the indoor conditions recorded with the use patterns via statistical analysis. Furthermore, the effect of the high thermal inertia of the stone masonry walls and the different orientation of the rooms is addressed. Thus, this paper concludes in some interesting results on the effect of the users in the indoor climate conditions in the case of buildings with high thermal inertia envelops.

Keywords: thermal comfort, in situ measurements, occupant behaviour, vernacular architecture

Procedia PDF Downloads 443
27080 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 357
27079 Alvaro Siza’s Design Strategy: An Insight into Critical Regionalism

Authors: Rahmatollah Amirjani

Abstract:

By the emergence of the debate over the failure of Regionalism in the late 1970s, Critical Regional­ism was introduced as a different way to respond to the state of architecture in the post-war era. Critical Regionalism is most often understood as a discourse that not only mediates the language of modern architecture with the local cultures but also revives the relation between architecture and spectator as indexed by capitalism. Since the inception of Critical Regionalism, a large number of architectural practices have emerged around the globe; however, the work of the well-known Portuguese architect, Álvaro Siza, is considered as a unique case amongst works associated with the discourse of Critical Regionalism. This paper intends to respond to a number of questions, including; what are the origins of Critical Regionalism? How does Siza’s design strategy correspond to the thematic of Critical Regionalism? How does Siza recover the relation between object and subject in most of his projects? Using Siza’s housing project for the Malagueira district in Évora, Portugal, this article will attempt to answer these questions, and highlight Alvaro Siza’s design procedure which goes beyond the existing discourse of Critical Regionalism and contributes to our understanding of this practice.

Keywords: Alvaro Siza, critical regionalism, Malagueira housing, placelessness

Procedia PDF Downloads 180
27078 Islamic Art and Architecture on Religious Buildings of Dagestan, Russia

Authors: Anahita Shahrokhi, Hamed Kazemzadeh

Abstract:

Various issues are included in cultural relations between societies. Art styles along with architectural similarities are by far one of the most noticeable cultural-historic relations. The Dagestan Republic located in the south of Russia Federation in the North Caucasus has had cultural relations with historical Iran since long ago and is considered as a part of the Islamic world. From Sassanid era and Islamic Empire prior to Tsars’ government, such relations had been maintained largely due to Iran and Islam’s political and social dominance over the region. The presence of the Iranians, mostly for business and commerce, is evident through not only written documents but also other cultural elements including architecture and art. Southern Dagestan and northern provinces of Iran, not distant from each other by sea, have a lot of artistic and cultural aspects in common. The architecture used in some structures such as religious centers, Tekie and Saqa Nafars strongly resembles religious centers in the south of Dagestan. The majority of these similarities lie in the wooden carvings, engravings, and paintings of the interior decorations on the pillars, capitals, walls, and ceilings, as well as the similarity of the plans. Such designs were formed in Safavid dynasty first in Mazandaran and later in Dagestan so that this style is currently named Persiski, meaning Persian, in the Dagestan Republic. These similarities indicate the relationship between the artists and educated people from Iran and Dagestan and the Iranians’ role on the religious and cultural development of Dagestan from the 17th and 18th centuries.

Keywords: wooden works, Mazandaran, Dagestan, Saqa Nafar, ritual and Islamic architecture

Procedia PDF Downloads 477
27077 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 142
27076 A Study on the Impacts of Computer Aided Design on the Architectural Design Process

Authors: Halleh Nejadriahi, Kamyar Arab

Abstract:

Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices.

Keywords: architecture, architectural practice, computer aided design (CAD), design process

Procedia PDF Downloads 360
27075 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 155
27074 Traffic Light Detection Using Image Segmentation

Authors: Vaishnavi Shivde, Shrishti Sinha, Trapti Mishra

Abstract:

Traffic light detection from a moving vehicle is an important technology both for driver safety assistance functions as well as for autonomous driving in the city. This paper proposed a deep-learning-based traffic light recognition method that consists of a pixel-wise image segmentation technique and a fully convolutional network i.e., UNET architecture. This paper has used a method for detecting the position and recognizing the state of the traffic lights in video sequences is presented and evaluated using Traffic Light Dataset which contains masked traffic light image data. The first stage is the detection, which is accomplished through image processing (image segmentation) techniques such as image cropping, color transformation, segmentation of possible traffic lights. The second stage is the recognition, which means identifying the color of the traffic light or knowing the state of traffic light which is achieved by using a Convolutional Neural Network (UNET architecture).

Keywords: traffic light detection, image segmentation, machine learning, classification, convolutional neural networks

Procedia PDF Downloads 173
27073 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 418
27072 Planning and Design Criteria to Make Urban Transport More Sustainable: The Case of Baku

Authors: Gülnar Bayramoğlu Barman

Abstract:

Since the industrial revolution, technological developments and increased population have caused environmental damages. To protect the nature and architectural environment, firstly, green architecture, ecological architecture and then sustainability occurred. This term has been proposed not to be a new term but a response to environmental disturbances caused by human activities and it is re-conceptualization of architecture. Sustainable architecture or sustainability is lot more extensive than ecological and green architecture. It contains the imbalance between environmental problems that is natural environment and consumption that occurred all around the world. An important part of sustainability debate focused on urban planning and design for more sustainable forms and patterns. In particular, it is discussed that planning and design of urban areas have a major effect on transport and therefore can help reduce car usage, emissions, global warming and climate change. There are many planning and design approaches and movement that introduce certain criteria and strategies to prevent car dependency and encourage people to use public transportation and walking. However, when review the literature, it is seen that planning movements, such as New Urbanism and Transit Oriented Development originated and were implemented mostly in West European and North American Cities. The purpose of this study is to find out whether all those criteria, principles and strategies are also relevant planning approaches for more non-western cities like Baku, which has a very different planning background and therefore possibly different urban form and transport issues. In order to answer the above mentioned question, planning and design approaches in the literature and these recent planning movements were studied and a check list was formed which indicate planning and design approaches that can help attain a more sustainable transport outcome. The checklist was then applied to the case of Baku.

Keywords: sustainability, sustainable development, sustainable transportation, transport, urban design

Procedia PDF Downloads 438