Search results for: cross layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8993

Search results for: cross layer security

8093 Structural and Microstructural Investigation into Causes of Rail Squat Defects and Their Correlation with White Etching Layers

Authors: A. Al-Juboori, D. Wexler, H. Li, H. Zhu, C. Lu, A. McCusker, J. McLeod, S. Pannila, Z. Wang

Abstract:

Squats are a type railhead defect related to rolling contact fatigue (RCF) damage and are considered serious problem affecting a wide range of railway networks across the world. Squats can lead to partial or complete rail failure. Formation mechanics of squats on the surface of rail steel is still a matter of debate. In this work, structural and microstructural observations from ex-service damaged rail both confirms the phases present in white etching layer (WEL) regions and relationship between cracking in WEL and squat defect formation. XRD synchrotron results obtained from the top surfaces of rail regions containing both WEL and squat defects reveal that these regions contain both martensite and retained austenite. Microstructural analysis of these regions revealed the occurrence cracks extending from WEL down into the rail through the squat region. These findings obtained from field rail specimen support the view that WEL contains regions of austenite and martensitic transformation product, and that cracks in this brittle surface layer propagate deeper into the rail as squats originate and grow.

Keywords: squat, white etching layer, rolling contact fatigue, synchrotron diffraction

Procedia PDF Downloads 330
8092 Unsteady Flow and Heat Transfer of Nanofluid from Circular Tube in Cross-Flow

Authors: H. Bayat, M. Majidi, M. Bolhasani, A. Karbalaie Alilou, A. Mirabdolah Lavasani

Abstract:

Unsteady flow and heat transfer from a circular cylinder in cross-flow is studied numerically. The governing equations are solved by using finite volume method. Reynolds number varies in range of 50 to 200, in this range flow is considered to be laminar and unsteady. Al2O3 nanoparticle with volume fraction in range of 5% to 20% is added to pure water. Effects of adding nanoparticle to pure water on lift and drag coefficient and Nusselt number is presented. Addition of Al2O3 has inconsiderable effect on the value of drags and lift coefficient. However, it has significant effect on heat transfer; results show that heat transfer of Al2O3 nanofluid is about 9% to 36% higher than pure water.

Keywords: nanofluid, heat transfer, unsteady flow, forced convection, cross-flow

Procedia PDF Downloads 396
8091 A Small-Scale Study of Fire Whirls and Investigation of the Effects of Near-Ground Height on the Behavior of Fire Whirls

Authors: M. Arabghahestani, A. Darwish Ahmad, N. K. Akafuah

Abstract:

In this work, small-scale experiments of fire whirl were conducted to study the spinning fire phenomenon and to gain comprehensive understandings of fire tornadoes and the factors that affect their behavior. High speed imaging was used to track the flames at both temporal and spatial scales. This allowed us to better understand the role of the near-ground height in creating a boundary layer flow profile that, in turn contributes to formation of vortices around the fire, and consequent fire whirls. Based on the results obtained from these observations, we were able to spot the differences in the fuel burning rate of the fire itself as a function of a newly defined specific non-dimensional near-ground height. Based on our observations, there is a cutoff non-dimensional height, beyond which a normal fire can be turned into a fire whirl. Additionally, the results showed that the fire burning rate decreases by moving the fire to a height higher than the ground level. These effects were justified by the interactions between vortices formed by, the back pressure and the boundary layer velocity profile, and the vortices generated by the fire itself.

Keywords: boundary layer profile, fire whirls, near-ground height, vortex interactions

Procedia PDF Downloads 158
8090 Numerical Modeling of Geogrid Reinforced Soil Bed under Strip Footings Using Finite Element Analysis

Authors: Ahmed M. Gamal, Adel M. Belal, S. A. Elsoud

Abstract:

This article aims to study the effect of reinforcement inclusions (geogrids) on the sand dunes bearing capacity under strip footings. In this research experimental physical model was carried out to study the effect of the first geogrid reinforcement depth (u/B), the spacing between the reinforcement (h/B) and its extension relative to the footing length (L/B) on the mobilized bearing capacity. This paper presents the numerical modeling using the commercial finite element package (PLAXIS version 8.2) to simulate the laboratory physical model, studying the same parameters previously handled in the experimental work (u/B, L/B & h/B) for the purpose of validation. In this study the soil, the geogrid, the interface element and the boundary condition are discussed with a set of finite element results and the validation. Then the validated FEM used for studying real material and dimensions of strip foundation. Based on the experimental and numerical investigation results, a significant increase in the bearing capacity of footings has occurred due to an appropriate location of the inclusions in sand. The optimum embedment depth of the first reinforcement layer (u/B) is equal to 0.25. The optimum spacing between each successive reinforcement layer (h/B) is equal to 0.75 B. The optimum Length of the reinforcement layer (L/B) is equal to 7.5 B. The optimum number of reinforcement is equal to 4 layers. The study showed a directly proportional relation between the number of reinforcement layer and the Bearing Capacity Ratio BCR, and an inversely proportional relation between the footing width and the BCR.

Keywords: reinforced soil, geogrid, sand dunes, bearing capacity

Procedia PDF Downloads 415
8089 The Cross-cultural Adaptation Experience of Foreign Scholars in China

Authors: Jiexiu Chen

Abstract:

This research aims to examine several vital issues relating to the foreign scholars’ cross-cultural adaptation in China, including how they perceive about the adaptation process, what the affecting factors are in the adaptation, and which strategies they will apply to deal with perceived cultural differences. The target population of this research is academics regularly working or long-term visiting in these joint colleges, and semi-structured interviews are used in data collection. Moreover, the theoretical perspectives mainly include Ward’s sociocultural and psychological adaptation theory, Berry’s adaptation strategies and Black and his colleague’s expatriate’s adjustment model. This research offers an in-depth profile as well as theory-based analysis about this unique group, and the results of this research are profound in offering directory suggestions for foreign scholars to facilitate their adaptation in China better and for the Chinese universities to eliminate intercultural obstacles, and optimize the international cooperation programs in China.

Keywords: cross-cultural adaptation, foreign scholars, expatriates

Procedia PDF Downloads 422
8088 Effect of the Food Distribution on Household Food Security Status in Iran

Authors: Delaram Ghodsi, Nasrin Omidvar, Hassan Eini-Zinab, Arash Rashidian, Hossein Raghfar

Abstract:

Food supplementary programs are policy approaches that aim to reduce financial barriers to healthy diets and tackle food insecurity. This study aimed to evaluate the effect of the supportive section of Multidisciplinary Supplementary Program for Improvement of Nutritional Status of Children (MuPINSC) on households’ food security status and nutritional status of mothers. MuPINSC is a national integrative program in Iran that distributes supplementary food basket to malnourished or growth retarded children living in low-income families in addition to providing health services, including sanitation, growth monitoring, and empowerment of families. This longitudinal study is part of a comprehensive evaluation of the program. The study participants included 359 mothers of children aged 6 to 72 month under coverage of the supportive section of the program in two provinces of Iran (Semnan and Qazvin). Demographic and economic characteristics of families were assessed by a questionnaire. Data on food security of family was collected by locally adapted Household Food Insecurity Access Scale (HFIAS) at the baseline of the study and six month thereafter. Weight and height of mothers were measured at the baseline and end of the study and mother’s BMI was calculated. Data were analysed, using paired t-test, GEE (Generalized Estimating Equation), and Chi-square tests. Based on the findings, at the baseline, only 4.7% of families were food-secure, while 13.1%, 38.7% and, 43.5% were categorized as mild, moderate and severe food insecure. After six months follow up, the distribution of different levels of food security changed significantly (P<0.001) to 7.9%, 11.6%, 42.6%, and 38%, respectively. At the end of the study, the chance of food insecurity was significantly 20% lower than the beginning (OR=0.796; 0.653-0.971). No significant difference was observed in maternal BMI based on food security (P>0.05). The findings show that the food supplementary program for children improved household food security status in the studied households. Further research is needed to assess other factors that affect the effectiveness of this large scale program on nutritional status and household’s food security.

Keywords: food security, food supplementary program, household, malnourished children

Procedia PDF Downloads 400
8087 Impact of HIV/AIDS on Food Security in Pala Sub-Location, Bondo District, Kenya

Authors: S. B. Otieno, Were Fred, E. W. Kabiru, K. Waza

Abstract:

Background: HIV/AIDS is leading to the loss of labor through sickness and subsequent death, this is leading to the neglect of farm and off-farm activities, with the subsequent loss of potential income and food security. The situation is sensitive to seasonal labour peaks in agriculture. This study was done to determine the impact of high HIV prevalence in farming systems and food security in Pala Bondo District, Kenya. Methods: In this study, 386 respondents were randomly chosen in Pala Sub-Location. The respondents and key informants were interviewed using structured questionnaire. The data were entered and analyzed using SPSS version 16. Results: It was established that majority of respondents (67%) were between 18 and 35 years {χ2 = (1, N = 386) = 13.430, p = 0.000} (chimney effect). The study also established that 83.5% of respondents were married {χ2 = (1, N= 370) = 166.277 p = 0.000} and predominant occupation being farming and fishing (61%), while 52.8% of farm labour was by hand, 26% by oxen, and 4.9% mechanized. 73.2% of respondents only farm 0.25 to 2 acres, 48% mentioned lack of labour in land preparation {χ2 ((1,N = 321) = 113.146, p = 0.000), in planting {χ2 (1, N = 321) = 29.28, p = 0.000}. Majority of respondents lack food from January to June, during which 93% buy food. Conclusion: The high HIV prevalence in Pala has affected the farm labour leading to food insecurity.

Keywords: food security, HIV, AIDS, labour

Procedia PDF Downloads 268
8086 Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria

Authors: Oyekan Kolawole Jamiu

Abstract:

The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria.

Keywords: terrorism, intelligent gathering, right to life, prosecution

Procedia PDF Downloads 347
8085 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 423
8084 A Computer-Aided System for Detection and Classification of Liver Cirrhosis

Authors: Abdel Hadi N. Ebraheim, Eman Azomi, Nefisa A. Fahmy

Abstract:

This paper designs and implements a computer-aided system (CAS) to help detect and diagnose liver cirrhosis in patients with Chronic Hepatitis C. Our system reduces the required features (tests) the patient is asked to do to tests to their minimal best most informative subset of tests, with a diagnostic accuracy above 99%, and hence saving both time and costs. We use the Support Vector Machine (SVM) with cross-validation, a Multilayer Perceptron Neural Network (MLP), and a Generalized Regression Neural Network (GRNN) that employs a base of radial functions for functional approximation, as classifiers. Our system is tested on 199 subjects, of them 99 Chronic Hepatitis C.The subjects were selected from among the outpatient clinic in National Herpetology and Tropical Medicine Research Institute (NHTMRI).

Keywords: liver cirrhosis, artificial neural network, support vector machine, multi-layer perceptron, classification, accuracy

Procedia PDF Downloads 460
8083 Optimal Tetra-Allele Cross Designs Including Specific Combining Ability Effects

Authors: Mohd Harun, Cini Varghese, Eldho Varghese, Seema Jaggi

Abstract:

Hybridization crosses find a vital role in breeding experiments to evaluate the combining abilities of individual parental lines or crosses for creation of lines with desirable qualities. There are various ways of obtaining progenies and further studying the combining ability effects of the lines taken in a breeding programme. Some of the most common methods are diallel or two-way cross, triallel or three-way cross, tetra-allele or four-way cross. These techniques help the breeders to improve the quantitative traits which are of economical as well as nutritional importance in crops and animals. Amongst these methods, tetra-allele cross provides extra information in terms of the higher specific combining ability (sca) effects and the hybrids thus produced exhibit individual as well as population buffering mechanism because of the broad genetic base. Most of the common commercial hybrids in corn are either three-way or four-way cross hybrids. Tetra-allele cross came out as the most practical and acceptable scheme for the production of slaughter pigs having fast growth rate, good feed efficiency, and carcass quality. Tetra-allele crosses are mostly used for exploitation of heterosis in case of commercial silkworm production. Experimental designs involving tetra-allele crosses have been studied extensively in literature. Optimality of designs has also been considered as a researchable issue. In practical situations, it is advisable to include sca effects in the model as this information is needed by the breeder to improve economically and nutritionally important quantitative traits. Thus, a model that provides information regarding the specific traits by utilizing sca effects along with general combining ability (gca) effects may help the breeders to deal with the problem of various stresses. In this paper, a model for experimental designs involving tetra-allele crosses that incorporates both gca and sca has been defined. Optimality aspects of such designs have been discussed incorporating sca effects in the model. Orthogonality conditions have been derived for block designs ensuring estimation of contrasts among the gca effects, after eliminating the nuisance factors, independently from sca effects. User friendly SAS macro and web solution (webPTC) have been developed for the generation and analysis of such designs.

Keywords: general combining ability, optimality, specific combining ability, tetra-allele cross, webPTC

Procedia PDF Downloads 136
8082 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 250
8081 Development of Piezoelectric Gas Micropumps with the PDMS Check Valve Design

Authors: Chiang-Ho Cheng, An-Shik Yang, Hon-Yi Cheng, Ming-Yu Lai

Abstract:

This paper presents the design and fabrication of a novel piezoelectric actuator for a gas micropump with check valve having the advantages of miniature size, light weight and low power consumption. The micropump is designed to have eight major components, namely a stainless steel upper cover layer, a piezoelectric actuator, a stainless steel diaphragm, a PDMS chamber layer, two stainless steel channel layers with two valve seats, a PDMS check valve layer with two cantilever-type check valves and an acrylic substrate. A prototype of the gas micropump, with a size of 52 mm × 50 mm × 5.0 mm, is fabricated by precise manufacturing. This device is designed to pump gases with the capability of performing the self-priming and bubble-tolerant work mode by maximizing the stroke volume of the membrane as well as the compression ratio via minimization of the dead volume of the micropump chamber and channel. By experiment apparatus setup, we can get the real-time values of the flow rate of micropump and the displacement of the piezoelectric actuator, simultaneously. The gas micropump obtained higher output performance under the sinusoidal waveform of 250 Vpp. The micropump achieved the maximum pumping rates of 1185 ml/min and back pressure of 7.14 kPa at the corresponding frequency of 120 and 50 Hz.

Keywords: PDMS, check valve, micropump, piezoelectric

Procedia PDF Downloads 453
8080 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 401
8079 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study

Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly

Abstract:

In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.

Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions

Procedia PDF Downloads 81
8078 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 480
8077 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 233
8076 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 163
8075 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women

Authors: Abeer Al Kalbani

Abstract:

Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.

Keywords: food security, household food security, utilization, role of women

Procedia PDF Downloads 405
8074 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 141
8073 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
8072 Fabrication and Analysis of Vertical Double-Diffused Metal Oxide Semiconductor (VDMOS)

Authors: Deepika Sharma, Bal Krishan

Abstract:

In this paper, the structure of N-channel VDMOS was designed and analyzed using Silvaco TCAD tools by varying N+ source doping concentration, P-Body doping concentration, gate oxide thickness and the diffuse time. VDMOS is considered to be ideal power switches due to its high input impedance and fast switching speed. The performance of the device was analyzed from the Ids vs Vgs curve. The electrical characteristics such as threshold voltage, gate oxide thickness and breakdown voltage for the proposed device structures were extarcted. Effect of epitaxial layer on various parameters is also observed.

Keywords: on-resistance, threshold voltage, epitaxial layer, breakdown voltage

Procedia PDF Downloads 325
8071 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 454
8070 Backward Erosion Piping through Vertically Layered Sands

Authors: K. Vandenboer, L. Dolphen, A. Bezuijen

Abstract:

Backward erosion piping is an important failure mechanism for water-retaining structures, a phenomenon that results in the formation of shallow pipes at the interface of a sandy or silty foundation and a cohesive cover layer. This paper studies the effect of two soil types on backward erosion piping; both in case of a homogeneous sand layer, and in a vertically layered sand sample, where the pipe is forced to subsequently grow through the different layers. Two configurations with vertical sand layers are tested; they both result in wider pipes and higher critical gradients, thereby making this an interesting topic in research on measures to prevent backward erosion piping failures.

Keywords: backward erosion piping, embankments, physical modeling, sand

Procedia PDF Downloads 388
8069 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability

Authors: Özlem Turan, Şule Turhan

Abstract:

About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.

Keywords: food, food safety, food systems, sustainability

Procedia PDF Downloads 383
8068 Crosssampler: A Digital Convolution Cross Synthesis Instrument

Authors: Jimmy Eadie

Abstract:

Convolutional Cross Synthesis (CCS) has emerged as a powerful technique for blending input signals to create hybrid sounds. It has significantly expanded the horizons of digital signal processing, enabling artists to explore audio effects. However, the conventional applications of CCS primarily revolve around reverberation and room simulation rather than being utilized as a creative synthesis method. In this paper, we present the design of a digital instrument called CrossSampler that harnesses a parametric approach to convolution cross-synthesis, which involves using adjustable parameters to control the blending of audio signals through convolution. These parameters allow for customization of the resulting sound, offering greater creative control and flexibility. It enables users to shape the output by manipulating factors such as duration, intensity, and spectral characteristics. This approach facilitates experimentation and exploration in sound design and opens new sonic possibilities.

Keywords: convolution, synthesis, sampling, virtual instrument

Procedia PDF Downloads 62
8067 Identifying a Drug Addict Person Using Artificial Neural Networks

Authors: Mustafa Al Sukar, Azzam Sleit, Abdullatif Abu-Dalhoum, Bassam Al-Kasasbeh

Abstract:

Use and abuse of drugs by teens is very common and can have dangerous consequences. The drugs contribute to physical and sexual aggression such as assault or rape. Some teenagers regularly use drugs to compensate for depression, anxiety or a lack of positive social skills. Teen resort to smoking should not be minimized because it can be "gateway drugs" for other drugs (marijuana, cocaine, hallucinogens, inhalants, and heroin). The combination of teenagers' curiosity, risk taking behavior, and social pressure make it very difficult to say no. This leads most teenagers to the questions: "Will it hurt to try once?" Nowadays, technological advances are changing our lives very rapidly and adding a lot of technologies that help us to track the risk of drug abuse such as smart phones, Wireless Sensor Networks (WSNs), Internet of Things (IoT), etc. This technique may help us to early discovery of drug abuse in order to prevent an aggravation of the influence of drugs on the abuser. In this paper, we have developed a Decision Support System (DSS) for detecting the drug abuse using Artificial Neural Network (ANN); we used a Multilayer Perceptron (MLP) feed-forward neural network in developing the system. The input layer includes 50 variables while the output layer contains one neuron which indicates whether the person is a drug addict. An iterative process is used to determine the number of hidden layers and the number of neurons in each one. We used multiple experiment models that have been completed with Log-Sigmoid transfer function. Particularly, 10-fold cross validation schemes are used to access the generalization of the proposed system. The experiment results have obtained 98.42% classification accuracy for correct diagnosis in our system. The data had been taken from 184 cases in Jordan according to a set of questions compiled from Specialists, and data have been obtained through the families of drug abusers.

Keywords: drug addiction, artificial neural networks, multilayer perceptron (MLP), decision support system

Procedia PDF Downloads 299
8066 Crosslinked PVA/Bentonite Clay Nanocomposite Membranes: An Effective Membrane for the Separation of Azeotropic Composition of Isopropanol and Water

Authors: Soney C. George, Thomasukutty Jose, Sabu Thomas

Abstract:

Membrane based separation is the most important energy –efficient separation processes. There are wide ranges of membrane based separation process such as Micro-filtration, ultra filtration, reverse osmosis, electro-dialysis etc. Among these pervaporation is one of the most promising techniques. The promising technique is in the sense that it needs an ease of process design, low energy consumption, environmentally clean, economically cost effective and easily separate azeotropic composition without losing any components, unlike distillation in a short period of time. In the present work, we developed a new bentonite clay reinforced cross-linked PVA nano-composite membranes by solution casting method. The membranes were used for the pervaporation separation of azeotropic composition of isopropanol and water mixtures. The azeotropic composition of water and isopropanol is difficult to separate and we can’t get a better separation by normal separation processes. But the better separation was achieved here using cross-linked PVA/Clay nano-composite membranes. The 2wt% bentonite clay reinforced 5vol% GA cross-linked nano-composite membranes showed better separation efficiency. The selectivity of the cross-linked membranes increases 65% upon filler loading. The water permeance is showed tremendous enhancement upon filler loading. The permeance value changes from 4100 to 8200, due to the incorporation hydrophilic bentonite clay to the cross-linked PVA membranes. The clay reinforced membranes shows better thermal stability upon filler loading was confirmed from TGA and DSC analysis. The dispersion of nanoclay in the polymeric matrix was clearly evident from the TEM analysis. The better dispersed membranes showed better separation performance. Thus the developed cross-linked PVA/Clay membranes can be effectively used for the separation of azeotropic composition of water and isopropanol.

Keywords: poly(vinyl alcohol), membrane, gluraldehyde, permeance

Procedia PDF Downloads 304
8065 Biocompatibility of Calcium Phosphate Coatings With Different Crystallinity Deposited by Sputtering

Authors: Ekaterina S. Marchenko, Gulsharat A. Baigonakova, Kirill M. Dubovikov, Igor A. Khlusov

Abstract:

NiTi alloys combine biomechanical and biochemical properties. This makes them a perfect candidate for medical applications. However, there is a serious problem with these alloys, such as the release of Ni from the matrix. Ni ions are known to be toxic to living tissues and leach from the matrix into the surrounding implant tissues due to corrosion after prolonged use. To prevent the release of Ni ions, corrosive strong coatings are usually used. Titanium nitride-based coatings are perfect corrosion inhibitors and also have good bioactive properties. However, there is an opportunity to improve the biochemical compatibility of the surface by depositing another layer. This layer can consist of elements such as calcium and phosphorus. The Ca and P ions form different calcium phosphate phases, which are present in the mineral part of human bones. We therefore believe that these elements must promote osteogenesis and osteointegration. In view of the above, the aim of this study is to investigate the effect of crystallinity on the biocompatibility of a two-layer coating deposited on NiTi substrate by sputtering. The first step of the research, apart from the NiTi polishing, is the layer-by-layer deposition of Ti-Ni-Ti by magnetron sputtering and the subsequent synthesis of this composite in an N atmosphere at 900 °C. The total thickness of the corrosion resistant layer is 150 nm. Plasma assisted RF sputtering was then used to deposit a bioactive film on the titanium nitride layer. A Ca-P powder target was used to obtain such a film. We deposited three types of Ca-P layers with different crystallinity and compared them in terms of cytotoxicity. One group of samples had no Ca-P coating and was used as a control. We obtained different crystallinity by varying the sputtering parameters such as bias voltage, plasma source current and pressure. XRD analysis showed that all coatings are calcium phosphate, but the sample obtained at maximum bias and plasma source current and minimum pressure has the most intense peaks from the coating phase. SEM and EDS showed that all three coatings have a homogeneous and dense structure without cracks and consist of calcium, phosphorus and oxygen. Cytotoxic tests carried out on three types of samples with Ca-P coatings and a control group showed that the control sample and the sample with Ca-P coating obtained at maximum bias voltage and plasma source current and minimum pressure had the lowest number of dead cells on the surface, around 11 ± 4%. Two other types of samples with Ca-P coating have 40 ± 9% and 21 ± 7% dead cells on the surface. It can therefore be concluded that these two sputtering modes have a negative effect on the corrosion resistance of the whole samples. The third sputtering mode does not affect the corrosion resistance and has the same level of cytotoxicity as the control. It can be concluded that the most suitable sputtering mode is the third with maximum bias voltage and plasma source current and minimum pressure.

Keywords: calcium phosphate coating, cytotoxicity, NiTi alloy, two-layer coating

Procedia PDF Downloads 65
8064 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 452