Search results for: AVL security
1868 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 301867 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 2661866 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 3391865 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 3181864 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 3871863 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle
Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang
Abstract:
The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids
Procedia PDF Downloads 2691862 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies
Authors: Maria Brás
Abstract:
The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery
Procedia PDF Downloads 3451861 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1911860 Geo Spatial Database for Railway Assets Management
Authors: Muhammad Umar
Abstract:
Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan
Procedia PDF Downloads 4911859 PLC Based Automatic Railway Crossing System for India
Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan
Abstract:
Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.Keywords: level crossing, PLC, sensors, SCADA
Procedia PDF Downloads 4271858 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN
Authors: Chander Shekhar Kohli
Abstract:
In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.Keywords: ASEAN, conflict resolution, norms and identities, peace and security
Procedia PDF Downloads 2071857 The ICC, International Criminal Justice and International Politics
Authors: Girma Y. Iyassu Menelik
Abstract:
The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling
Procedia PDF Downloads 4491856 On the Path of Radicalization: Policing of Muslim Americans Post 9/11
Authors: Hagar Elsayed
Abstract:
This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.Keywords: American-Muslims, Arabs, militarization, policing
Procedia PDF Downloads 1361855 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector
Authors: Loong Qing Zhe, Foo Jing Heng
Abstract:
A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)
Procedia PDF Downloads 1911854 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 611853 Employee Well-being in the Age of AI: Perceptions, Concerns, Behaviors, and Outcomes
Authors: Soheila Sadeghi
Abstract:
— The growing integration of Artificial Intelligence (AI) into Human Resources (HR) processes has transformed the way organizations manage recruitment, performance evaluation, and employee engagement. While AI offers numerous advantages—such as improved efficiency, reduced bias, and hyper-personalization—it raises significant concerns about employee well-being, job security, fairness, and transparency. The study examines how AI shapes employee perceptions, job satisfaction, mental health, and retention. Key findings reveal that: (a) while AI can enhance efficiency and reduce bias, it also raises concerns about job security, fairness, and privacy; (b) transparency in AI systems emerges as a critical factor in fostering trust and positive employee attitudes; and (c) AI systems can both support and undermine employee well-being, depending on how they are implemented and perceived. The research introduces an AI-employee well-being Interaction Framework, illustrating how AI influences employee perceptions, behaviors, and outcomes. Organizational strategies, such as (a) clear communication, (b) upskilling programs, and (c) employee involvement in AI implementation, are identified as crucial for mitigating negative impacts and enhancing positive outcomes. The study concludes that the successful integration of AI in HR requires a balanced approach that (a) prioritizes employee well-being, (b) facilitates human-AI collaboration, and (c) ensures ethical and transparent AI practices alongside technological advancement.Keywords: artificial intelligence, human resources, employee well-being, job satisfaction, organizational support, transparency in AI
Procedia PDF Downloads 291852 Cyber Operational Design and Military Decision Making Process
Authors: M. Karaman, H. Catalkaya
Abstract:
Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state
Procedia PDF Downloads 5891851 Eco-Survivalism and Nomadic Pastoralism: An Exploratory Study on the Dialectics of Herder-Farmer Conflict in Nigeria
Authors: Francis N. Okpaleke
Abstract:
The threat of Fulani herder militancy in Nigeria has led to a volatile security situation characterized by communal strife, arms proliferation, rural banditry, and insurgency. The exigency of this situation resonates in the eco-survivalist theory of farmer-herder conflict which holds that the herder deems the farmers’ unwarranted incursions into his grazing terrain as an effrontery that must reprised and a call to war. In spite of the rising incidence of Fulani militancy in Nigeria, only little is known concerning the phenomenon. The bulk of prevailing ideas on the subject has been largely and unnecessarily journalistic and anecdotal, lacking in intellectual depth, fecundity and rigour. The issue has remained scarcely documented by way of organized research. There is therefore a need for a systematic investigation that would leverage scholarly and policy insights on the subject which is the purpose of this study. The study will therefore, seek to examine the nexus between nomadic pastoralism and the incidence of herder-farmer conflicts in Nigeria with particular reference to the central region of the country. By means of qualitative descriptive analysis predicated on the theory of eco-violence, the paper explores the contemporary historical and structural drivers of this conflict, its relationship with the dynamics of climate change in Nigeria and its implication of human security in Nigeria. The paper also proffers theoretical and policy recommendations to mitigate the onto ward conflict.Keywords: eco-survivalism, conflict, pastoralism, nomads
Procedia PDF Downloads 3141850 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 611849 Migration, Labour Market, Capital Formation, and Social Security: A Study of Livelihoods of the Urban Poor in Two Different Cities of West Bengal in India
Authors: Arup Pramanik
Abstract:
Most of the cities in the developing countries like Siliguri Municipal Corporation Area (SMCA) and Raiganj Municipality (RM) in West Bengal, India are changing typically in terms of demographic, economic and social relationship due to rapid pace of urbanization. The mushrooming growth of slums in SMCA and RM is the direct consequence of urbanization and migration due to regional imbalance, unbalanced growth process which is posing a serious threat to sustainable development of the country. Almost all the slums happen to be a breeding ground for poverty, negligence, and disease. Unpredictable growth of slums and poverty alleviation has now become a serious challenge to the global and national policy makers for the development of the slum dwellers. The ethical dimension of the poor in the cities like SMCA and RM stands on equal opportunities, inclusive and harmonious living without discrimination of any kind. But, the migrant slum dwellers in SMCA and RM do not possess high skill or education to enable them to find well paid employment in the formal sector and the surplus urban labour force is compelled to generate its own means of employment and survival in the informal sector. The survey data of the households has been analysedin terms of percentage, descriptive statistics which includes mean, Standard Deviation (SD), ANOVA (Mean Difference) etc., to analyse the socio economic variables of the households. The study shows that the migrant labour forces living in the slums are derived from the social security measures in both the municipal areas of SMCA and RM. The urban poor in the cities of SMCA and RM rely heavily on social capital amongst all the capital assets to help them ‘get by’ and ‘get ahead’. Despite, the slum dwellers in the study areas are vulnerable with respect to other determinants of capital assets. It is noteworthy that Indian plans of anti-poverty programmes was in a proper place even after the neo-liberal regime, where the basic idea behind the massive shift of various welfare and service oriented strategy to poverty reduction strategy for the benefit of the urban poor with the trickle down effects. But, the overall impact of the trickledown effect was unsatisfactory. The objective of the Paper is to assess the magnitude of migration and absorption in the urban labour market. Issues relating to capital formation, social security measures and the support of the Welfare State in order to meet 'Sustainable Development Goals'. This study also highlights the quality of life of urban poor migrants in terms of capital formation and livelihoods.Keywords: migration, slums, labour market, capital formation, social security
Procedia PDF Downloads 1181848 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
Ultra-secured methods of banking services have been introduced to the customer, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. Consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 451847 Influence of Different Ripening Agents on the Shelf-Life and Microbial Load of Organic and Inorganic Musaceae, during the Ripening Process, and the Health Implication for Food Security
Authors: Wisdom Robert Duruji
Abstract:
Local farmers and fruit processors in developing countries of West Africa use different ripening agents to accelerate the ripening process of plantain and banana. This study reports on the influence of different ripening agents on the shelf-life and microbial load of organic and inorganic plantain (Musa paradisiaca) and banana (Musa sapientum) during ripening process and the health implication for food security in Nigeria. The experiment consisted of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening agent was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating their micro flora (Bacteria, Yeast and Mould) using pour plate method. Microbes present in the samples were enumerated, characterized and classified to genera and species. The result indicated that the microbial load of inorganic plantain from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 12.11 cfu/g for ripened; and the microbial load of organic plantain from Obafemi Awolowo University Teaching and Research Farm (OAUTRF) increased from 6.00 for unripe to 11.60 cfu/g for ripened. Also, the microbial load of inorganic banana from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 11.50 cfu/g for ripened; while the microbial load of organic banana from OAUTRF increased from 6.50 for unripe to 9.40 cfu/g for ripened. The microbial effects of the ripening agents increased from 10.00 for control to 16.00 cfu/g for treated (ripened) organic and inorganic plantain; while that of organic and inorganic banana increased from 7.50 for control to 14.50 cfu/g for ripened. Visual observation for the presence of fungal colonies and deterioration rates were monitored till seven days after the plantain and banana fingers have fully ripened. Inorganic plantain and banana from (Urban day) open market in Ile-Ife are more contaminated than organic plantain and banana fingers from OAUTRF. The ripening accelerators reduced the shelf life, increased senescence, and microbial load of plantain and banana. This study concluded that organic Agriculture is better and microbial friendlier than inorganic farming.Keywords: organic agriculture, food security, Musaceae, calcium carbide, Irvingia gabonensis, Newbouldia laevis
Procedia PDF Downloads 5841846 Potential of Tourism Logistic Service Business in the Border Areas of Chong Anma, Chong Sa-Ngam, and Chong Jom Checkpoints in Thailand to Increase Competitive Efficiency among the ASEAN Community
Authors: Pariwat Somnuek
Abstract:
This study focused on tourism logistic services in the border areas of Thailand by an analysis and comparison of the opinions of tourists, villagers, and entrepreneurs of these services. Sample representatives of this study were a total of 600 villagers and 15 entrepreneurs in the three border areas consisting of Chong Anma, Chong Sa-Ngam, and Chong Jom checkpoints. For methodology, survey questionnaires, situation analysis, TOWS matrix, and focus group discussions were used for data collection, as well as descriptive analysis and statistics such as arithmetic means and standard deviations, were employed for data analysis. The findings revealed that business potential was at the medium level and entrepreneurs were satisfied with their turnovers. However, perspectives of transportation and tourism services provided for tourists need to be immediately improved. Recommendations for the potential development included promotion of border tourism destinations and foreign investments into accommodation, restaurants, and transport, as well as the establishment of business networks between Thailand and Cambodia, along with the introduction of new tourism destinations by co-operation between entrepreneurs in both countries. These initiatives may lead to increased visitors, collaboration of security offices, and an improved image of tourism security.Keywords: business potential, potential development, tourism logistics, services
Procedia PDF Downloads 3081845 Criminal Attitude vs Transparency in the Arab World
Authors: Keroles Akram Saed Ghatas
Abstract:
The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.
Procedia PDF Downloads 441844 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria
Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi
Abstract:
Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization
Procedia PDF Downloads 2901843 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes
Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay
Abstract:
Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe
Procedia PDF Downloads 1491842 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 2631841 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook
Authors: Soorya Vennila
Abstract:
The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.Keywords: health, watersecurity, water quality, climate change
Procedia PDF Downloads 781840 Household Earthquake Absorptive Capacity Impact on Food Security: A Case Study in Rural Costa Rica
Authors: Laura Rodríguez Amaya
Abstract:
The impact of natural disasters on food security can be devastating, especially in rural settings where livelihoods are closely tied to their productive assets. In hazards studies, absorptive capacity is seen as a threshold that impacts the degree of people’s recovery after a natural disaster. Increasing our understanding of households’ capacity to absorb natural disaster shocks can provide the international community with viable measurements for assessing at-risk communities’ resilience to food insecurities. The purpose of this study is to identify the most important factors in determining a household’s capacity to absorb the impact of a natural disaster. This is an empirical study conducted in six communities in Costa Rica affected by earthquakes. The Earthquake Impact Index was developed for the selection of the communities in this study. The households coded as total loss in the selected communities constituted the sampling frame from which the sample population was drawn. Because of the study area geographically dispersion over a large surface, the stratified clustered sampling hybrid technique was selected. Of the 302 households identified as total loss in the six communities, a total of 126 households were surveyed, constituting 42 percent of the sampling frame. A list of indicators compiled based on theoretical and exploratory grounds for the absorptive capacity construct served to guide the survey development. These indicators were included in the following variables: (1) use of informal safety nets, (2) Coping Strategy, (3) Physical Connectivity, and (4) Infrastructure Damage. A multivariate data analysis was conducted using Statistical Package for Social Sciences (SPSS). The results show that informal safety nets such as family and friends assistance exerted the greatest influence on the ability of households to absorb the impact of earthquakes. In conclusion, communities that experienced the highest environmental impact and human loss got disconnected from the social networks needed to absorb the shock’s impact. This resulted in higher levels of household food insecurity.Keywords: absorptive capacity, earthquake, food security, rural
Procedia PDF Downloads 2531839 Filtering Intrusion Detection Alarms Using Ant Clustering Approach
Authors: Ghodhbani Salah, Jemili Farah
Abstract:
With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms
Procedia PDF Downloads 404