Search results for: safety and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5758

Search results for: safety and security

4828 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 387
4827 Innovative Power Engineering in a Selected Rural Commune

Authors: Pawel Sowa, Joachim Bargiel

Abstract:

This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.

Keywords: energy security, mini energy centres , power engineering, power supply reliability

Procedia PDF Downloads 296
4826 Investigating the Pedestrian Willingness to Pay to Choose Appropriate Policies for Improving the Safety of Pedestrian Facilities

Authors: Babak Mirbaha, Mahmoud Saffarzadeh, Fatemeh Mohajeri

Abstract:

Road traffic accidents lead to a higher rate of death and injury, especially in vulnerable road users such as pedestrians. Improving the safety of facilities for pedestrians is a major concern for policymakers because of the high number of pedestrian fatalities and direct and indirect costs which are imposed to the society. This study focuses on the idea of determining the willingness to pay of pedestrians for increasing their safety while crossing the street. In this study, three different scenarios including crossing the street with zebra crossing facilities, crossing the street with zebra crossing facilities and installing a pedestrian traffic light and constructing a pedestrian bridge with escalator are presented. The research was conducted based on stated preferences method. The required data were collected from a questionnaire that consisted of three parts: pedestrian’s demographic characteristics, travel characteristics and scenarios. Four different payment amounts are presented for each scenario and a logit model has been built for each proposed payment. The results show that sex, age, education, average household income and individual salary have significant effect on choosing a scenario. Among the policies that have been mentioned through the questionnaire scenarios, the scenario of crossing the street with zebra crossing facilities and installing a traffic lights is the most frequent, with willingness to pay 10,000 Rials and the scenario of crossing the street with a zebra crossing with a willingness to pay 100,000 Rials having the least frequency. For all scenarios, as the payment is increasing, the willingness to pay decreases.

Keywords: pedestrians, willingness to pay, safety, immunization

Procedia PDF Downloads 152
4825 Static and Dynamic Tailings Dam Monitoring with Accelerometers

Authors: Cristiana Ortigão, Antonio Couto, Thiago Gabriel

Abstract:

In the wake of Samarco Fundão’s failure in 2015 followed by Vale’s Brumadinho disaster in 2019, the Brazilian National Mining Agency started a comprehensive dam safety programmed to rank dam safety risks and establish monitoring and analysis procedures. This paper focuses on the use of accelerometers for static and dynamic applications. Static applications may employ tiltmeters, as an example shown later in this paper. Dynamic monitoring of a structure with accelerometers yields its dynamic signature and this technique has also been successfully used in Brazil and this paper gives an example of tailings dam.

Keywords: instrumentation, dynamic, monitoring, tailings, dams, tiltmeters, automation

Procedia PDF Downloads 140
4824 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 290
4823 Assessment of Knowledge, Attitudes and Practices of Street Vendors in Mangaung Metro South Africa

Authors: Gaofetoge Lenetha, Malerato Moloi, Ntsoaki Malebo

Abstract:

Microbial contamination of ready-to-eat foods and beverages sold by street vendors has become an important public health issue. In developing countries including South Africa, health risks related to such kinds of foods are thought to be common. Thus, this study assessed knowledge, attitude and practices of street food vendors. Street vendors in the city of Mangaung Metro were investigated in order to assess their knowledge, attitudes and handling practices. A semi-structured questionnaire and checklist were used in interviews to determine the status of the vending sites and associa. ted food-handling practices. Data was collected by means of a face-to-face interview. The majority of respondents were black females. Hundred percent (100%) of the participants did not have any food safety training. However, street vendors showed a positive attitude towards food safety. Despite the positive attitude, vendors showed some non-compliance when it comes to handling food. During the survey, it was also observed that the vending stalls lack basic infrastructures like toilets and potable water that is currently a major problem. This study indicates a need for improvements in the environmental conditions at these sites to prevent foodborne diseases. Moreover, based on the results observed food safety and food hygiene training or workshops for street vendors are highly recommended.

Keywords: food hygiene, foodborne illnesses, food safety, Street foods

Procedia PDF Downloads 109
4822 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 58
4821 Assessment of Nuclear Medicine Radiation Protection Practices Among Radiographers and Nurses at a Small Nuclear Medicine Department in a Tertiary Hospital

Authors: Nyathi Mpumelelo; Moeng Thabiso Maria

Abstract:

BACKGROUND AND OBJECTIVES: Radiopharmaceuticals are used for diagnosis, treatment, staging and follow up of various diseases. However, there is concern that the ionizing radiation (gamma rays, α and ß particles) emitted by radiopharmaceuticals may result in exposure of radiographers and nurses with limited knowledge of the principles of radiation protection and safety, raising the risk of cancer induction. This study aimed at investigation radiation safety awareness levels among radiographers and nurses at a small tertiary hospital in South Africa. METHODS: An analytical cross-sectional study. A validated two-part questionnaire was implemented to consenting radiographers and nurses working in a Nuclear Medicine Department. Part 1 gathered demographic information (age, gender, work experience, attendance to/or passing ionizing radiation protection courses). Part 2 covered questions related to knowledge and awareness of radiation protection principles. RESULTS: Six radiographers and five nurses participated (27% males and 73% females). The mean age was 45 years (age range 20-60 years). The study revealed that neither professional development courses nor radiation protection courses are offered at the Nuclear Medicine Department understudy. However, 6/6 (100%) radiographers exhibited a high level of awareness of radiation safety principles on handling and working with radiopharmaceuticals which correlated to their years of experience. As for nurses, 4/5 (80%) showed limited knowledge and awareness of radiation protection principles irrespective of the number of years in the profession. CONCLUSION: Despite their major role of caring for patients undergoing diagnostic and therapeutic treatments, the nurses showed limited knowledge of ionizing radiation and associated side effects. This was not surprising since they never received any formal basic radiation safety course. These findings were not unique to this Centre. A study conducted in a Kuwaiti Radiology Department also established that the vast majority of nurses did not understand the risks of working with ionizing radiation. Similarly, nurses in an Australian hospital exhibited knowledge limitations. However, nursing managers did provide the necessary radiation safety training when requested. In Guatemala and Saudi Arabia, where there was shortage of professional radiographers, nurses underwent radiography training, a course that equipped them with basic radiation safety principles. The radiographers in the Centre understudy unlike others in various parts of the world demonstrated substantial knowledge and awareness on radiation protection. Radiations safety courses attended when an opportunity arose played a critical role in their awareness. The knowledge and awareness levels of these radiographers were comparable to their counterparts in Sudan. However, it was much more above that of their counterparts in Jordan, Nigeria, Nepal and Iran who were found to have limited awareness and inadequate knowledge on radiation dose. Formal radiation safety and awareness courses and workshops can play a crucial role in raising the awareness of nurses and radiographers on radiation safety for their personal benefit and that of their patients.

Keywords: radiation safety, radiation awareness, training, nuclear medicine

Procedia PDF Downloads 71
4820 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 139
4819 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 465
4818 An Immersive Serious Game for Firefighting and Evacuation Training in Healthcare Facilities

Authors: Anass Rahouti, Guillaume Salze, Ruggiero Lovreglio, Sélim Datoussaïd

Abstract:

In healthcare facilities, training the staff for firefighting and evacuation in real buildings is very challenging due to the presence of a vulnerable population in such an environment. In a standard environment, traditional approaches, such as fire drills, are often used to train the occupants and provide them with information about fire safety procedures. However, those traditional approaches may be inappropriate for a vulnerable population and can be inefficient from an educational viewpoint as it is impossible to expose the occupants to scenarios similar to a real emergency. Immersive serious games could be used as an alternative to traditional approaches to overcome their limitations. Serious games are already being used in different safety domains such as fires, earthquakes and terror attacks for several building types (e.g., office buildings, train stations, tunnels, etc.). In this study, we developed an immersive serious game to improve the fire safety skills of staff in healthcare facilities. An accurate representation of the healthcare environment was built in Unity3D by including visual and audio stimuli inspired from those employed in commercial action games. The serious game is organised in three levels. In each of them, the trainee is presented with a specific fire emergency and s/he can perform protective actions (e.g., firefighting, helping non-ambulant occupants, etc.) or s/he can ignore the opportunity for action and continue the evacuation. In this paper, we describe all the steps required to develop such a prototype, as well as the key questions that need to be answered, to develop a serious game for firefighting and evacuation in healthcare facilities.

Keywords: fire safety, healthcare, serious game, training

Procedia PDF Downloads 450
4817 Reduction of the Number of Traffic Accidents by Function of Driver's Anger Detection

Authors: Masahiro Miyaji

Abstract:

When a driver happens to be involved in some traffic congestion or after traffic incidents, the driver may fall in a state of anger. State of anger may encounter decisive risk resulting in severer traffic accidents. Preventive safety function using driver’s psychosomatic state with regard to anger may be one of solutions which would avoid that kind of risks. Identifying driver’s anger state is important to create countermeasures to prevent the risk of traffic accidents. As a first step, this research figured out root cause of traffic incidents by means of using Internet survey. From statistical analysis of the survey, dominant psychosomatic states immediately before traffic incidents were haste, distraction, drowsiness and anger. Then, we replicated anger state of a driver while driving, and then, replicated it by means of using driving simulator on bench test basis. Six types of facial expressions including anger were introduced as alternative characteristics. Kohonen neural network was adopted to classify anger state. Then, we created a methodology to detect anger state of a driver in high accuracy. We presented a driving support safety function. The function adapts driver’s anger state in cooperation with an autonomous driving unit to reduce the number of traffic accidents. Consequently, e evaluated reduction rate of driver’s anger in the traffic accident. To validate the estimation results, we referred the reduction rate of Advanced Safety Vehicle (ASV) as well as Intelligent Transportation Systems (ITS).

Keywords: Kohonen neural network, driver’s anger state, reduction of traffic accidents, driver’s state adaptive driving support safety

Procedia PDF Downloads 355
4816 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 135
4815 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 35
4814 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 148
4813 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 111
4812 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 317
4811 Health and Safety Risk Assesment with Electromagnetic Field Exposure for Call Center Workers

Authors: Dilsad Akal

Abstract:

Aim: Companies communicate with each other and with their costumers via call centers. Call centers are defined as stressful because of their uncertain working hours, inadequate relief time, performance based system and heavy workload. In literature, this sector is defined as risky as mining sector by means of health and safety. The aim of this research is to enlight the relatively dark area. Subject and Methods: The collection of data for this study completed during April-May 2015 for the two selected call centers in different parts of Turkey. The applied question mostly investigated the health conditions of call center workers. Electromagnetic field measurements were completed at the same time with applying the question poll. The ratio of employee accessibility noted as 73% for the first call center and 87% for the second. Results: The results of electromagnetic field measurements were as between 371 V/m-32 V/m for the first location and between 370 V/m-61 V/m for the second. The general complaints of the employees for both workplaces can be counted as; inadequate relief time, inadequate air conditioning, disturbance, poor thermal conditions, inadequate or extreme lighting. Furthermore, musculoskeletal discomfort, stress, ear and eye discomfort are main health problems of employees. Conclusion: The measured values and the responses to the question poll were found parallel with the other similar research results in literature. At the end of this survey, a risk map of workplace was prepared in terms of safety and health at work in general and some suggestions for resolution were provided.

Keywords: call center, health and safety, electromagnetic field, risk map

Procedia PDF Downloads 179
4810 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 135
4809 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective

Authors: Geuna Kim, Sanghyun Kim

Abstract:

This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.

Keywords: information security management, need pull, technology push, regulatory pressure

Procedia PDF Downloads 287
4808 The Influence of Fiber Fillers on the Bonding Safety of Wood-Adhesive Interfaces: A Fracture Energetic Approach

Authors: M. H. Brandtner-Hafner

Abstract:

Adhesives have established themselves as an innovative joining technology in the wood industry. The strengths of adhesive bonding lie in the realization of lightweight designs, the avoidance of material weakening, and the joining of different types of materials. There is now a number of ways to positively influence the properties of bonded joints. One way is to add fiber fillers. This leads to an improvement in adhesion, structural integrity, and fracture toughness. In this study, the effectiveness of fiber-modified adhesives for bonding wooden joints is reviewed. A series of experimental tests were performed using the fracture analytical GF-principle to study the adhesive bonding safety and performance of the wood-adhesive interface. Two different construction adhesives based on epoxy and PUR were modified with different fiber materials and applied to bond wooden joints. The results show that bonding efficiency by adding fibrous materials to the bonding matrix leads to significant improvements in structural material properties.

Keywords: fiber-modified adhesives, bonding safety, wood-adhesive interfaces, fracture analysis

Procedia PDF Downloads 91
4807 Safety Effect of Smart Right-Turn Design at Intersections

Authors: Upal Barua

Abstract:

The risk of severe crashes at high-speed right-turns at intersections is a major safety concern these days. The application of a smart right-turn at an intersection is increasing day by day to address is an issue. The design, ‘Smart Right-turn’ consists of a narrow-angle of channelization at approximately 70°. This design increases the cone of vision of the right-tuning drivers towards the crossing pedestrians as well as traffic on the cross-road. As part of the Safety Improvement Program in Austin Transportation Department, several smart right-turns were constructed at high crash intersections where high-speed right-turns were found to be a contributing factor. This paper features the state of the art techniques applied in planning, engineering, designing and construction of this smart right-turn, key factors driving the success, and lessons learned in the process. This paper also presents the significant crash reductions achieved from the application of this smart right-turn design using Empirical Bayes method. The result showed that smart right-turns can reduce overall right-turn crashes by 43% and severe right-turn crashes by 70%.

Keywords: smart right-turn, intersection, cone of vision, empirical Bayes method

Procedia PDF Downloads 262
4806 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 209
4805 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 179
4804 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 215
4803 Experimental Study of Complete Loss of Coolant Flow (CLOF) Test by System–Integrated Modular Advanced Reactor Integral Test Loop (SMART-ITL) with Passive Residual Heat Removal System (PRHRS)

Authors: Jin Hwa Yang, Hwang Bae, Sung Uk Ryu, Byong Guk Jeon, Sung Jae Yi, Hyun Sik Park

Abstract:

Experimental studies using a large-scale thermal-hydraulic integral test facility, System–integrated Modular Advanced Reactor Integral Test Loop (SMART-ITL), have been carried out to validate the performance of the prototype, SMART. After Fukushima accident, the passive safety systems have been dealt as important designs for retaining of nuclear safety. One of the concerned scenarios for evaluating the passive safety system is a Complete Loss of Coolant Flow (CLOF). The flowrate of coolant in the primary system is maintained by Reactor Coolant Pump (RCP). When the supply of electric power of RCP is shut off, the flowrate of coolant decreases sharply, and the temperature of the coolant increases rapidly. Therefore, the reactor trip signal is activated to prevent the over-heating of the core. In this situation, Passive Residual Heat Removal System (PRHRS) plays a significant role to assure the soundness of the SMART. The PRHRS using a two-phase natural circulation is a passive safety system in the SMART to eliminate the heat of steam generator in the secondary system with heat exchanger submarined in the Emergency Cooling Tank (ECT). As the RCPs continue to coast down, inherent natural circulation in the primary system transfers heat to the secondary system. The transferred heat is removed by PRHRS in the secondary system. In this paper, the progress of the CLOF accident is described with experimental data of transient condition performed by SMART-ITL. Finally, the capability of passive safety system and inherent natural circulation will be evaluated.

Keywords: CLOF, natural circulation, PRHRS, SMART-ITL

Procedia PDF Downloads 436
4802 A Study to Connect the Objective Interface Design Characters To Ergonomic Safety

Authors: Gaoguang Yang, Shan Fu

Abstract:

Human-machine interface (HMI) intermediate system information to human operators to facilitate human ability to manage and control the system. Well-designed HMI would enhance human ability. An evaluation must be performed to confirm that the designed HMI would enhance but not degrade human ability. However, the prevalent HMI evaluation techniques have difficulties in more thoroughly and accurately evaluating the suitability and fitness of a given HMI for the wide variety of uncertainty contained in both the existing HMI evaluation techniques and the large number of task scenarios. The first limitation should be attributed to the subjective and qualitative analysis characteristics of these evaluation methods, and the second one should be attributed to the cost balance. This study aims to explore the connection between objective HMI characters and ergonomic safety and step forward toward solving these limitations with objective, characterized HMI parameters. A simulation experiment was performed with the time needed for human operators to recognize the HMI information as characterized HMI parameter, and the result showed a strong correlation between the parameter and ergonomic safety level.

Keywords: Human-Machine Interface (HMI), evaluation, objective, characterization, simulation

Procedia PDF Downloads 62
4801 Exploring the Intricate Microbiology of Street Cuisine: Delving into Potential Dangers in Order to Enhance Safety and Quality

Authors: Raana Babadi Fathipour

Abstract:

Street foods hold a significant place in the tapestry of socioeconomic and cultural norms, beloved across the globe. Serving as a convenient and affordable option for city dwellers seeking nourishment, these culinary delights also serve as a vital source of income for vendors, particularly women. Additionally, street food acts as a mirror reflecting traditional local customs and practices, an element that draws tourists to experience the authenticity of a culture firsthand. Despite its many virtues, concerns have emerged regarding the microbiological safety of street food worldwide. Often prepared and sold in subpar conditions without proper oversight or regulation, street food has become synonymous with potential health risks. The presence of elevated levels of fecal indicator bacteria and various pathogens in these unregulated delicacies further perpetuates anxieties surrounding their consumption. This analysis delves into the intricate microbiological intricacies inherent in street food, shedding light on the pertinent safety concerns and prevalent pathogens. Additionally, it elaborates on the worldwide standing of this vital economic endeavor. Moreover, it advocates for the adoption of molecular detection techniques over conventional culture-based methods to gain a more comprehensive grasp of the true microbial risks posed by street cuisine. Acknowledgment marks the initial step towards resolving any given issue.

Keywords: foodborne pathogens, microbiological safety, street food, viruses

Procedia PDF Downloads 45
4800 Empowering Leadership and Constructive Voice: A Sequential Mediation Analysis

Authors: Umamaheswara Rao Jada, Susmita Mukhopadhyay

Abstract:

In the present highly complex, dynamic and interdependent organizational environment, employees' ideas, opinions and suggestions which is technically referred to as ‘constructive employee voice’ is increasingly being recognized and valued. Literature has consistently demonstrated the relevance of leadership in employee voicing behavior, however the new form of leadership, ‘empowering leadership’ has not been given much attention. The study, therefore, devotes itself to the effort to explore the impact of this new form of leadership on employee voice behavior and the interplay with leader member exchange (LMX) and psychological safety as mediators in the same. The study utilizes structural equation modeling for analyzing the data collected from 310 Indian service industry employees through the questionnaire developed for the study. The findings of the study demonstrate the significant impact of empowering form of leadership on employees’ constructive voice behavior. Additionally, supporting results were observed for the mediating impact of leader member exchange (LMX) and psychological safety between empowering leadership and employees’ constructive voice behavior. The results of this study provide insights into the intervening mechanisms by linking leaders’ empowering behavior with employees’ constructive voice, while also highlighting the potential importance of LMX relationship in organizations and psychological safety in the context of constructive voice behavior. The study brings forth the relevance of the new form of leadership, ‘empowering leadership’ for fostering the better exchange of ideas, opinions, and suggestions between leaders and followers which tend to benefit the organization, providing empirical evidence of the sequential mediation of LMX and psychological safety. The piece of work is assumed to benefit the leaders in organizations by providing them the basis for adopting empowering form of leadership in light of results displayed.

Keywords: constructive voice, empowering leadership, leader member exchange (LMX), psychological safety, sequential mediation, structural equation modeling

Procedia PDF Downloads 302
4799 Key Affecting Factors for Social Sustainability through Urban Green Space Planning

Authors: Raziyeh Teimouri, Sadasivam Karuppannan, Alpana Sivam, Ning Gu

Abstract:

Urban Green Space (UGS) is one of the most critical components of urban systems to create sustainable cities. UGS has valuable social benefits that closely correlate with people's life quality. Studying social sustainability factors that can be achieved by green spaces is required for optimal UGS planning to increase urban social sustainability. This paper aims to identify key factors that enhance urban social sustainability through UGS planning. To reach the goal of the study international experts’ survey has been conducted. According to the results of the survey analysis, factors of proper distribution, links to public transportation, walkable access, sense of place, social interactions, public education, safety and security, walkability and cyclability, physical activity and recreational facilities, suitability for all ages, disabled people, women, and children are among the key factors that should consider in UGS planning programs to promote urban social sustainability.

Keywords: UGS, planning, social sustainability, key factors

Procedia PDF Downloads 71