Search results for: enhancing security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4789

Search results for: enhancing security

3829 Research on the Evolutionary Character of Capital in Rural Areas and Counter-Measure of Planning

Authors: Han Song, Tingting Wei, Dong Chen

Abstract:

The combination of capital and rural areas in China has shown its great significance in promoting urban-rural integration and new-style urbanization, enhancing regional capacity for sustainable rural development and optimizing human settlement environment. The purpose of this study is to find capital operation mechanism in rural area and rural planning guidance in China. Based on case studies in Chinese rural areas, two types of capital operation mechanism in rural areas are summed up: intervention in the field of agriculture promoting the upgrading and innovation of agricultural industry chain, intervention in rural life and leisure areas updating rural connotation and form. In the light of experiences in Japan and Taiwan, it is proposed that government's norms and guidance, rural investment intensity and rural self-organization are three important factors for capital to drive rural development. It is also found that the unique land tenure and rural governance tradition are two important factors effecting the combination of capital and rural regions in China, which requires full attention in rational policy-making and rural planning. It comes to a conclusion as four directions of the overall reform of the rural planning: targeting at enhancing the viability of rural and sustainable capacity, encouraging differences in investment incentives and planning policies, providing land usage in the rural areas with planning support and reforming the village system. Directional guidance is also made for different types of capital investments, suggesting that capital should be rooted in agriculture and rural land to benefit farmers and update human settlements.

Keywords: capital, rural areas, rural planning, rural governance

Procedia PDF Downloads 445
3828 Relationship between Mental Health and Food Access among Healthcare College Students in a Snowy Area in Japan

Authors: Yuki Irie, Shota Ogawa, Hitomi Kosugi, Hiromitsu Shinozaki

Abstract:

Background: Dropout from higher educational institutions is a major problem both for students and institutions, and poor mental health is one of the risk factors. Medical college students are at higher risk of poor mental health than general students because of their hard academic schedules. On the other hand, food insecurity has negative impacts on mental health. The healthcare college of the project site is located heavily snowy area. The students without own vehicles may be at higher risk of food insecurity, especially in the winter season. Therefore, they have many risks to mental health. The aim of the study is to clarify the relationship between mental health and its risk factors to promote students’ mental well-being. Method: A cross-sectional design was used to investigate the relationship between mental health status and lifestyle, including diet and food security among the students (n=421, 147 male, 274 females; 20.7 ± 2.8 years old). Participants were required to answer 3 questionnaires which consisted of diet, lifestyle, food security, and mental health. The survey was conducted during the snowy season from Dec. 2022 to Jan. 2023. Results: Mean mental score was 6.7±4.6 (max. score 27, a higher score means worse mental health). Significant risk factors in mental health were breakfast habit (p=0.02), subjective dietary habit (p=0.00), subjective health (p=0.00), exercise habit (p=0.02), food insecurity in the winter season (p=0.01), and vitamin A intakes (p=0.03). Conclusions: Nutrients intakes are not associated with mental health except vitamin A; however, some other lifestyle factors are significantly associated with mental health. Nutrition doesn’t lead to poor mental health directly; however, the promotion of a healthy lifestyle and improved food security in winter may be effective in better mental health.

Keywords: mental health, winter, lifestyle, students

Procedia PDF Downloads 86
3827 Exploring the Applications of Modular Forms in Cryptography

Authors: Berhane Tewelday Weldhiwot

Abstract:

This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.

Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory

Procedia PDF Downloads 5
3826 The Role of Blended Modality in Enhancing Active Learning Strategies in Higher Education: A Case Study of a Hybrid Course of Oral Production and Listening of French

Authors: Tharwat N. Hijjawi

Abstract:

Learning oral skills in an Arabic speaking environment is challenging. A blended course (material, activities, and individual/ group work tasks …) was implemented in a module of level B1 for undergraduate students of French as a foreign language in order to increase their opportunities to practice listening and speaking skills. This research investigates the influence of this modality on enhancing active learning and examines the effectiveness of provided strategies. Moreover, it aims at discovering how it allows teacher to flip the traditional classroom and create a learner-centered framework. Which approaches were integrated to motivate students and urge them to search, analyze, criticize, create and accomplish projects? What was the perception of students? This paper is based on the qualitative findings of a questionnaire and a focus group interview with learners. Despite the doubled time and effort both “teacher” and “student” needed, results revealed that the NTIC allowed a shift into a learning paradigm where learners were the “chiefs” of the process. Tasks and collaborative projects required higher intellectual capacities from them. Learners appreciated this experience and developed new life-long learning competencies at many levels: social, affective, ethical and cognitive. To conclude, they defined themselves as motivated young researchers, motivators and critical thinkers.

Keywords: active learning, critical thinking, inverted classroom, learning paradigm, problem-based

Procedia PDF Downloads 266
3825 4-Allylpyrocatechol Loaded Polymeric Micelles for Solubility Enhancing and Effects on Streptococcus mutans Biofilms

Authors: Siriporn Okonogi, Pimpak Phumat, Sakornrat Khongkhunthian

Abstract:

Piper betle has been extensively reported for various pharmacological effects including antimicrobial activity. 4-Allylpyrocatechol (AC) is a principle active compound found in P. betle. However, AC has a problem of solubility in water. The aims of the present study were to prepare AC loaded polymeric micelles for enhancing its water solubility and to evaluate its anti-biofilm activity against oral phathogenic bacteria. AC was loaded in polymeric micelles (PM) of Pluronic F127 by using thin film hydration method to obtain AC loaded PM (PMAC). The results revealed that AC in the form of PMAC possessed high water solubility. PMAC particles were characterized using a transmission electron microscope and photon correlation spectroscopy. Determination of entrapment efficiency (EE) and loading capacity (LC) of PMAC was done by using high-performance liquid chromatography. The highest EE (86.33 ± 14.27 %) and LC (19.25 ± 3.18 %) of PMAC were found when the weight ratio of polymer to AC was 4 to 1. At this ratio, the particles showed spherical in shape with the size of 38.83 ± 1.36 nm and polydispersity index of 0.28 ± 0.10. Zeta potential of the particles is negative with the value of 16.43 ± 0.55 mV. Crystal violet assay and confocal microscopy were applied to evaluate the effects of PMAC on Streptococcus mutans biofilms using chlorhexidine (CHX) as a positive control. PMAC contained 1.5 mg/mL AC could potentially inhibit (102.01 ± 9.18%) and significantly eradicate (85.05 ± 2.03 %) these biofilms (p < 0.05). Comparison with CHX, PMAC showed slightly similar biofilm inhibition but significantly stronger biofilm eradication (p < 0.05) than CHX. It is concluded that PMAC can enhance water solubility and anti-biofilm activity of AC.

Keywords: pluronic, polymeric micelles, solubility, 4-allylpyrocathecol, Streptococcus mutans, anti-biofilm

Procedia PDF Downloads 141
3824 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 159
3823 Digital Customer Relationship Management on Service Delivery Performance

Authors: Reuben Kinyuru Njuguna, Martin Mabuya Njuguna

Abstract:

Digital platforms, such as The Internet, and the advent of digital marketing strategies, have led to many changes in the marketing of goods and services. These have resulted in improved service quality, enhanced customer relations, productivity gains, marketing transaction cost reductions, improved customer service and flexibility in fulfilling customers’ changing needs and lifestyles. Consequently, the purpose of this study was to determine the effect of digital marketing practices on the financial performance of mobile network operators in the telecommunications industry in Kenya. The objectives of the study were to establish how digital customer relationship management strategies on performance of mobile network operators in Kenya. The study used an explanatory cross-sectional survey research design, while the target population was made up of from the 4 major mobile network operators in Kenya, namely Safaricom Limited, Airtel Networks Kenya Limited, Finserve Africa Limited and Telkom Kenya Limited. Sampling strategy was stratified sampling with a sample size of 97 respondents. Digital customer relationship strategies were seen to influence firm performance, through enhancing convenience, building trust, encouraging growth in market share through creating sustainable relationships, building commitment with customers, enhancing customer retention and customer satisfaction. Digital customer relationship management were seen to maximize gross profits by increasing customer satisfaction, loyalty and retention. The study recommended upscaling the use of digital customer relationship management strategies to further enhance firm performance, given their great potential in this regard.

Keywords: customer relationship management, customer service delivery, performance, customer satisfaction

Procedia PDF Downloads 232
3822 Drought Alters the Expression of a Candidate Zea Mays P-Coumarate 3-Hydroxylase Gene and Caffeic Acid Biosynthesis

Authors: Zintle Kolo, Ndiko Ludidi

Abstract:

The enzymatic activity of p-coumarate 3-hydroxylase (C3H) synthesize caffeic acid from p-coumaric acid. We recently showed that exogenously applied caffeic acid confers salinity tolerance in soybean (Glycine max) by inducing antioxidant enzymatic activity to promote enhanced scavenging or reactive oxygen species, thus limiting salinity-induced oxidative stress. Recent evidence also establishes that pre-treatment of plants with exogenously supplied caffeic acid improves plant tolerance to osmotic stress by improving plant antioxidant capacity and enhancing biosynthesis of compatible solutes. We aimed to identify a C3H in maize (Zea mays) and evaluate the effect of drought on the spatial and temporal expression of the gene encoding the candidate maize C3H (ZmC3H). Primary sequence analysis shows that ZmC3H shares 71% identity with an Arabidopsis thaliana C3H that is implicated in the control of Arabidopsis cell expansion, growth, and responses to stress. In silico ZmC3H promoter analysis reveals the presence of cis-acting elements that interact with transcription factors implicated in plant responses to drought. Spatial expression analysis by semi-quantitative RT-PCR shows that ZmC3H is expressed in both leaves and roots under normal conditions. However, drought represses the expression of ZmC3H in leaves whereas it up-regulates its expression in roots. These changes in ZmC3H expression correlate with the changes in the content of caffeic acid in maize in response to drought. We illustrate the implications of these changes in the expression of the gene in relation to maize responses to drought and discuss the potential of regulating caffeic acid biosynthesis towards genetic improvement of maize tolerance to drought stress. These findings have implications for food security because of the potential of the implications of the study for drought tolerance in maize.

Keywords: caffeic acid, drought-responsive expression, maize drought tolerance, p-coumarate 3-hydroxylase

Procedia PDF Downloads 469
3821 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 424
3820 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 247
3819 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges

Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold

Abstract:

If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).

Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience

Procedia PDF Downloads 182
3818 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 138
3817 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 257
3816 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce

Authors: Neelima Rashmi Lakra

Abstract:

India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.

Keywords: public sectors, social justice, social security schemes, trade union movement

Procedia PDF Downloads 448
3815 ChaQra: A Cellular Unit of the Indian Quantum Network

Authors: Shashank Gupta, Iteash Agarwal, Vijayalaxmi Mogiligidda, Rajesh Kumar Krishnan, Sruthi Chennuri, Deepika Aggarwal, Anwesha Hoodati, Sheroy Cooper, Ranjan, Mohammad Bilal Sheik, Bhavya K. M., Manasa Hegde, M. Naveen Krishna, Amit Kumar Chauhan, Mallikarjun Korrapati, Sumit Singh, J. B. Singh, Sunil Sud, Sunil Gupta, Sidhartha Pant, Sankar, Neha Agrawal, Ashish Ranjan, Piyush Mohapatra, Roopak T., Arsh Ahmad, Nanjunda M., Dilip Singh

Abstract:

Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission.

Keywords: quantum network, quantum key distribution, quantum security, quantum information

Procedia PDF Downloads 51
3814 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 108
3813 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 94
3812 Factors Affecting Sense of Community in Residential Communities Case Study: Residential Communities in Tehran, Iran

Authors: Parvin Foroughifar

Abstract:

The concept of sense of community refers to residents’ sense of attachment and commitment to the other residents in a residential community. It is implicitly indicative of the mental image of a physical environment in which the residents enjoy strong social ties. Sense of community, a crucial factor in improving quality of life and social welfare, leads to life satisfaction in a residential community. Despite the important functions of such a notion, few empirical studies, to the best of the authors' knowledge, have been so far carried out in Iran to investigate the effective factors in sharpening the sense of community in residential communities. This survey research examined sense of community in 360 above 20-year old residents of three residential communities in Tehran, Iran using cluster sampling and questionnaire. The study yielded the result that variables of local social ties, social control and trust, sense of security, length of residence, use of public spaces, and mixed land use have a significant relationship with sense of community.

Keywords: sense of community, local social ties, sense of security, public space, residential community, Tehran

Procedia PDF Downloads 186
3811 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 389
3810 Photoelectrochemical Water Splitting from Earth-Abundant CuO Thin Film Photocathode: Enhancing Performance and Photo-Stability through Deposition of Overlayers

Authors: Wilman Septina, Rajiv R. Prabhakar, Thomas Moehl, David Tilley

Abstract:

Cupric oxide (CuO) is a promising absorber material for the fabrication of scalable, low cost solar energy conversion devices, due to the high abundance and low toxicity of copper. It is a p-type semiconductor with a band gap of around 1.5 eV, absorbing a significant portion of the solar spectrum. One of the main challenges in using CuO as solar absorber in an aqueous system is its tendency towards photocorrosion, generating Cu2O and metallic Cu. Although there have been several reports of CuO as a photocathode for hydrogen production, it is unclear how much of the observed current actually corresponds to H2 evolution, as the inevitability of photocorrosion is usually not addressed. In this research, we investigated the effect of the deposition of overlayers onto CuO thin films for the purpose of enhancing its photostability as well as performance for water splitting applications. CuO thin film was fabricated by galvanic electrodeposition of metallic copper onto gold-coated FTO substrates, followed by annealing in air at 600 °C. Photoelectrochemical measurement of the bare CuO film using 1 M phosphate buffer (pH 6.9) under simulated AM 1.5 sunlight showed a current density of ca. 1.5 mA cm-2 (at 0.4 VRHE), which photocorroded to Cu metal upon prolonged illumination. This photocorrosion could be suppressed by deposition of 50 nm-thick TiO2, deposited by atomic layer deposition. In addition, we found that insertion of an n-type CdS layer, deposited by chemical bath deposition, between the CuO and TiO2 layers was able to enhance significantly the photocurrent compared to without the CdS layer. A photocurrent of over 2 mA cm-2 (at 0 VRHE) was observed using the photocathode stack FTO/Au/CuO/CdS/TiO2/Pt. Structural, electrochemical, and photostability characterizations of the photocathode as well as results on various overlayers will be presented.

Keywords: CuO, hydrogen, photoelectrochemical, photostability, water splitting

Procedia PDF Downloads 217
3809 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 140
3808 Investigating Role of Traumatic Events in a Pakistani Sample

Authors: Khadeeja Munawar, Shamsul Haque

Abstract:

The claim that traumatic events influence the recalled memories and mental health has received mixed empirical support. This study examines the memories of a sample drawn from Pakistan, a country that has witnessed many life-changing socio-political events, wars, and natural disasters in 72 years of its history. A sample of 210 senior citizens (Mage = 64.35, SD = 6.33) was recruited from Pakistan. The aim was to investigate if participants retrieved more memories related to past traumatic events using a word-cueing technique. Each participant reported ten memories to ten neutral cue words. The results revealed that past traumatic events were not adversely affecting the memories and mental health of participants. When memories were plotted with respect to the ages at which the events happened, a pronounced bump at 11-20 years of age was seen. Memories within as well as outside of the bump were mostly positive. The multilevel logistic regression modelling showed that the memories recalled were personally important and played a role in enhancing resilience. The findings revealed that despite facing an array of ethnic, religious, political, economic, and social conflicts, the participants were resilient, recalled predominantly positive memories, and had intact mental health. The findings have clinical implications in Cognitive Behavioral Therapy (CBT). The patients can be made aware of their negative emotions, troublesome/traumatic memories, and the distorted thinking patterns and their memories can be restructured. The findings can also be used to teach Memory Specificity Training (MEST) by psycho-educating the patients around changes in memory functioning and enhancing the recall of memories, which are more specific, vivid, and filled with sensory details.

Keywords: cognitive behavioral therapy, memories, mental health, resilience, trauma

Procedia PDF Downloads 150
3807 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 158
3806 Development of 4-Allylpyrocatechol Loaded Self-Nanoemulsifying Drug Delivery System for Enhancing Water Solubility and Antibacterial Activity against Oral Pathogenic Bacteria

Authors: Pimpak Phumat, Sakornrat Khongkhunthian, Thomas Rades, Anette Müllertz, Siriporn Okonogi

Abstract:

Self-nanoemulsifying drug delivery systems (SNEDDS) containing 4-allylpyrocatechol (AP) extracted from Piper betle were developed to enhance water solubility of AP by using modeling and design (MODDE) program. The amount of AP in each SNEDDS formulation was determined by using high-performance liquid chromatography. The formulation consisted of 20% Miglyol®812N, 40 % Kolliphor®RH40, 30 % Maisine®35-1 and 10 % ethanol was found to be the best SNEDDS that provided the highest loading capacity of AP. (141.48±15.64 mg/g SNEDDS). The system also showed miscibility with water. The particle shape and size of the AP-SNEDDS after dispersing in water was investigated by using a transmission electron microscope and photon correlation spectrophotometer, respectively. The results showed that they were a spherical shape, having a particle size of 34.27 ± 1.14 nm with a narrow size distribution of 0.17 ± 0.04. The particles showed negative zeta potential with a value of -21.66 ± 2.09 mV. Antibacterial activity of AP-SNEDDS containing 1.5 mg/mL of AP was investigated against Streptococcus intermedius. The effect of this system on S. intermedius cells was observed by a scanning electron microscope (SEM). The results from SEM revealed that the bacterial cells were obviously destroyed. Killing kinetic study of AP-SNEDDS was carried out. It was found that the killing rate of AP-SNEDDS against S. intermedius was dose-dependent and the bacterial reduction was 79.86 ± 0.45 % within 30 min. In comparison with chlorhexidine (CHX), AP-SNEDDS showed similar antibacterial effects against S. intermedius. It is concluded that SNEDDS is a potential system for enhancing water solubility of AP. The antibacterial study reveals that AP-SNEDDS can be a promising system to treat bacterial infection caused by S. intermedius.

Keywords: SNEDDS, 4-allylpyrocathecol, solubility, antibacterial activity, Streptococcus intermedius

Procedia PDF Downloads 113
3805 The Interplay of Community-based Social Capital and Neighbourhood Dynamics in Enhancing SMEs’ Resilience During Crises: A Fuzzy-Set Qualitative Comparative Analysis Approach

Authors: Arash Sadeghi, Taimaz Larimian

Abstract:

This study explores the intricate interplay between community-based social capital (CBSC) and neighbourhood dynamics in enhancing resilience of Iranian SMEs, particularly under the strain of international sanctions. Utilising fuzzy-set Qualitative Comparative Analysis (fsQCA), we examine how different dimensions of CBSC—structural, relational, and cognitive—interact with neighbourhood socio-economic and built-environment characteristics to influence SME resilience. Findings reveal four configurations that contribute to the presence of resistance and five configurations associated with the adaptation outcome. Each configuration demonstrates a distinct combination of social capital elements, which vary according to the specific socio-economic and built-environmental characteristics of the neighbourhoods. The first configuration highlights the importance of structural social capital in deprived areas for building resistance, while the second emphasises the role of relational social capital in low-density, minimally deprived areas. Overall, cognitive social capital seems to be less effective in driving economic resilience compared to structural and relational types. This research contributes to the literature by providing a nuanced understanding of the synergistic effects of CBSC dimensions and neighbourhood characteristics on SME resilience. By adopting a configurational approach, we move beyond traditional methodologies, offering a comprehensive view of the complex dynamics of CBSC and neighbourhood characteristics and their impact on SME resilience in varying neighbourhoods.

Keywords: community-based social capital, fuzzy-set qualitative comparative analysis (fsQCA), place-based resilience, resistance

Procedia PDF Downloads 49
3804 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 137
3803 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 403
3802 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process

Authors: Itai Kohavi, Wojciech Nowiak

Abstract:

This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.

Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation

Procedia PDF Downloads 299
3801 Enhancing Creative Writing Skill through the Implementation of Creative Thinking Process

Authors: Bussabamintra Chalauisaeng

Abstract:

The creative writing skill of Thai fourth year university learners majoring in English at Khon Kaen University, Thailand has been enhanced in an English creative writing course through the implementation of creative thinking process. The creative writing assignments cover writing a variety of short poems and a short story, bibliography and short play scripts. However, this study focuses mainly on writing short poems and short stories through the implementation of creative thinking process via action research design with on-going needs analysis and feedbacks to meet their learning needs for 45 hours. At the end of the course, forty two learners’ creative writing skill appeared to be significantly improved. Through the research instruments such as the tasks assigned both inside and outside the class as self –study including class observation, semi-conversational interviews and teacher feedback both in persons and on line including peer feedbacks. The research findings show that the target learners could produce better short poems and short story assessed by the set of criteria such as the creative and innovative short poems and short stories with complete and interesting elements of a short story like plot, theme, setting, symbolism and so on. This includes a higher level of the awareness of the pragmatic use of English writing in terms of word choices, grammar rules and writing styles. All of these outcomes reflect positive trends of success in terms of the learners’ improved creative writing skill as well as better attitudes to and motivation for learning to write English for pleasure. More interestingly, many learners claimed that this innovative teaching method through the implementation of creative thinking process integrated with creative writing help stretch their imaginations and inspire them to become a writer in the future.

Keywords: creative thinking process, creative writing skill, enhancing, implementing

Procedia PDF Downloads 171
3800 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 320