Search results for: security risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8386

Search results for: security risk

7396 Understanding the Effect of Fall Armyworm and Integrated Pest Management Practices on the Farm Productivity and Food Security in Malawi

Authors: Innocent Pangapanga, Eric Mungatana

Abstract:

Fall armyworm (FAW) (Spodoptera frugiperda), an invasive lepidopteran pest, has caused substantial yield loss since its first detection in September 2016, thereby threatening the farm productivity food security and poverty reduction initiatives in Malawi. Several stakeholders, including households, have adopted chemical pesticides to control FAW without accounting for its costs on welfare, health and the environment. Thus, this study has used panel data endogenous switching regression model to investigate the impact of FAW and the integrated pest management (IPM) –related practices on-farm productivity and food security. The study finds that FAW substantively reduces farm productivity by seven (7) percent and influences the adoption of IPM –related practices, namely, intercropping, mulching, and agroforestry, by 6 percent, ceteris paribus. Interestingly, multiple adoptions of the IPM -related practices noticeably increase farm productivity by 21 percent. After accounting for potential endogeneity through the endogenous switching regression model, the IPM practices further demonstrate tenfold more improvement on food security, implying the role of the IPM –related practices in containing the effect of FAW at the household level.

Keywords: hunger, invasive fall army worms, integrated pest management practices, farm productivity, endogenous switching regression

Procedia PDF Downloads 130
7395 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism

Authors: Adamu Buba

Abstract:

As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.

Keywords: challenges, security, governance, ecowas, response

Procedia PDF Downloads 248
7394 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 476
7393 The Underestimation of Cultural Risk in the Execution of Megaprojects

Authors: Alan Walsh, Peter Walker, Michael Ellis

Abstract:

There is a real danger that both practitioners and researchers considering risks associated with megaprojects ignore or underestimate the impacts of cultural risk. The paper investigates the potential impacts of a failure to achieve cultural unity between the principal actors executing a megaproject. The principle relationships include the relationships between the principle Contractors and the project stakeholders or the project stakeholders and their principle advisors, Western Consultants. This study confirms that cultural dissonance between these parties can delay or disrupt the megaproject execution and examines why cultural issues should be prioritized as a significant risk factor in megaproject delivery. This paper addresses the practical impacts and potential mitigation measures, which may reduce cultural dissonance for a megaproject's delivery. This information is retrieved from on-going case studies in live infrastructure megaprojects in Europe and the Middle East's GCC states, from Western Consultants' perspective. The collaborating researchers each have at least 30 years of construction experience and are engaged in architecture, project management and contracts management, dealing with megaprojects in Europe or the GCC. After examining the cultural interfaces they have observed during the execution of megaprojects, they conclude that globally, culture significantly influences their efficient delivery. The study finds that cultural risk is ever-present, where different nationalities co-manage megaprojects and that cultural conflict poses a real threat to the timely delivery of megaprojects. The study indicates that the higher the cultural distance between the principal actors, the more pronounced the risk, with the risk of cultural dissonance more prominent in GCC megaprojects. The findings support a more culturally aware and cohesive team approach and recommend cross-cultural training to mitigate the effects of cultural disparity.

Keywords: cultural risk underestimation, cultural distance, megaproject characteristics, megaproject execution

Procedia PDF Downloads 102
7392 Assessment of Households' Food Security and Hunger Level across Communities in Ile-Ife, Southwestern Nigeria

Authors: Adebayo-Victoria Tobi Dada, Dada Emmanuel

Abstract:

This study assessed households’ food security and hunger levels among different communities with varying educational and economic background in Ile-Ife, Nigeria, and its environment. It also examined the impacts of varying demography on the household food security level in the area. This was with a view to providing information on the food security status of the subjects within the study area. Ten different communities with varying demography (Parakin, Mokuro, Ilare, Obafemi Awolowo University (OAU) Staff Quarters, Ibadan Road, Aba-Iya Gani, Eleweran, Iraye, Boosa, and Eku-Isobo) were identified within the study area. Fieldwork was then carried out from 7th to 14th of March, 2016 in each of these communities through survey of market prices of food stuff, diet, and nutrition, social well-being, food accessibility and affordability as well as price fluctuation and variation in household’s social background. Selection of households for the survey was done using stratified random sampling method. Key informants included community heads, landlords, tenants, and household heads. Similarly, information on food security levels with respect to demographic backgrounds was obtained from the use of modified Food and Hunger Insecurity Module (FHIM) structured questionnaire. The questionnaire was administered to one percent of the households’ population per community. The results showed that communities such as Parakin and OAU Senior Staff Quarters were dominated by civil servants, while community such as Boosa was dominated by artisans. Respondents earning between ₦11,000 and ₦20,000 per month, during the study period, had the highest percentage across the selected communities. The household food security indices showed that about 41% of the investigated respondents could not guarantee their household food for a month, while 18% reduced or skipped meals. There were positive significant relationships between monthly income (F-value = 132.04), educational status (F-value = 102.30), occupation (F-value = 104.05) and food budget (F-value = 122.09), all at p < 0.05. However, there was no significant relationship between the monthly food budget and household sizes (t-value = -1.4074, p > 0.05). Food secured households’ had the household heads with a higher level of educational attainment. The study concluded that large variations which existed between socio-economic and educational background among the communities had significant effects on households’ food security level in the study area.

Keywords: food security, households, hunger level, market prices

Procedia PDF Downloads 207
7391 Prosperous Digital Image Watermarking Approach by Using DCT-DWT

Authors: Prabhakar C. Dhavale, Meenakshi M. Pawar

Abstract:

In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacks

Keywords: watermarking, digital, DCT-DWT, security

Procedia PDF Downloads 417
7390 An Investigation of Crop Diversity’s Impact on Income Risk of Selected Crops

Authors: Saeed Yazdani, Sima Mohamadi Amidabadi, Amir Mohamadi Nejsd, Farahnaz Nekoofar

Abstract:

As a result of uncertainty and doubts about the quantity of agricultural products, greater significance has been attached to risk management in the agricultural sector. Normally, farmers seek to minimize risks, and crop diversity has always been a means to reduce risk. The study at hand seeks to explore the long-term impact of crop diversity on income risk reduction. The timeframe of the study is 1998 to 2018. Initially, the Herfindahl index was used to estimate crop diversity in different periods, and next, the Hodrick-Prescott filter was applied to estimate income risk both in nominal and real terms. Finally, using the vector error correction model (VECM), the long-term impact of crop diversity on two modes of risk for the farmer's income has been estimated. Given the long-term pattern’s results, it is evident that in the long run, crop diversity can reduce income fluctuations in two nominal and real terms. Moreover, results showed that in case the fluctuation shock affects the agricultural income in the short run, to balance out the shock in nominal and real terms, 4 and 3 cycles are needed, respectively. In other words, in each cycle, 25% and 33% of the shock impact can be removed, respectively. Thus, as the results of the error correction coefficient showed, policies need to be put in place to prevent income shocks. In case of a shock, they need to be balanced out in a four-year period, taking inflation into account, and in a three-year period irrespective of the inflation, and reparative policies such as insurance services should be developed.

Keywords: risk, long-term model, Herfindahl index, time series model, vector error correction model

Procedia PDF Downloads 17
7389 Challenges in E-Government: Conceptual Views and Solutions

Authors: Rasim Alguliev, Farhad Yusifov

Abstract:

Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.

Keywords: electron government, public administration, information security, web-analytics, social networks, data mining

Procedia PDF Downloads 469
7388 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 387
7387 Innovative Power Engineering in a Selected Rural Commune

Authors: Pawel Sowa, Joachim Bargiel

Abstract:

This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.

Keywords: energy security, mini energy centres , power engineering, power supply reliability

Procedia PDF Downloads 296
7386 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 92
7385 The Situation of Transgender Individuals Was Worsened During Covid-19

Authors: Kajal Attri

Abstract:

Introduction: Transgender people are considered third gender in India, although they still face identification issues and alienated from society. Furthermore, they face several challenges, including discrimination in employment, resources, education, and property as a result, most transgender people make a living through begging at traffic lights, trains, and buses; attending auspicious occasions such as childbirth and weddings; and engaging in sex work, which includes both home-based and street-based sex work. During COVID-19, maintaining social distance exacerbates transgender people's circumstances and prevents them from accessing health care services, sexual reassignment surgery, identity-based resources, government security, and financial stability. Nonetheless, the pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. This study focuses on how we missed transgender people during COVID-19 to provide better facilities to cope with this situation when they are already the most vulnerable segment of the society. Methodology: The research was conducted using secondary data from published publications and grey literature obtained from four databases: Pubmed, Psychinfo, Science direct, and Google scholar. The literature included total 25 articles that met the inclusion criteria for a review. Result and Discussion: Transgender people, who are considered the most vulnerable sector of society, have already faced several obstacles as a result of the outbreak. The analysis underscores the difficulties that transgender persons faced during COVID-19, such as, They had trouble accessing the government's social security programmes during the lockdown, which provide rations and pensions since they lack the necessary identifying cards. The impact of COVID-19 leaves transgender people at heightened risk of poverty and ill health because they exist on the margins of society, those livelihood base on sex work, begging, and participation on auspicious occasions. They had a significant risk of contracting SARS-CoV2 because they lived in congested areas or did not have permanent shelter, and they were predominantly infected with HIV, cancer, and other non-communicable illnesses. The pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. Conclusion: The study comes forward with useful suggestions based on content analysis and information to reduce the existing woes of transgenders during any pandemic like COVID-19.

Keywords: COVID-19, transgender, lockdown, transwomen, stigmatization

Procedia PDF Downloads 73
7384 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 58
7383 Flood Risk Management in Low Income Countries: Balancing Risk and Development

Authors: Gavin Quibell, Martin Kleynhans, Margot Soler

Abstract:

The Sendai Framework notes that disaster risk reduction is essential for sustainable development, and Disaster Risk Reduction is included in 3 of the Sustainable Development Goals (SDGs), and 4 of the SDG targets. However, apart from promoting better governance and resourcing of disaster management agencies, little guidance is given how low-income nations can balance investments across the SDGs to achieve sustainable development in an increasingly climate vulnerable world with increasing prevalence of flood and drought disasters. As one of the world’s poorest nations, Malawi must balance investments across all the SDGs. This paper explores how Malawi’s National Guidelines for Community-based Flood Risk Management integrate sustainable development and flood management objectives at different administrative levels. While Malawi periodically suffers from large, widespread flooding, the greatest impacts are felt through the smaller annual floods and flash floods. The Guidelines address this through principles that recognize that while the protection of human life is the most important priority for flood risk management, addressing the impacts of floods on the rural poor and the economy requires different approaches. The National Guidelines are therefore underpinned by the following; 1. In the short-term investments in flood risk management must focus on breaking the poverty – vulnerability cycle; 2. In the long-term investments in the other SDGs will have the greatest flood risk management benefits; 3. If measures are in place to prevent loss of life and protect strategic infrastructure, it is better to protect more people against small and medium size floods than fewer people against larger floods; 4. Flood prevention measures should focus on small (1:5 return period) floods; 5. Flood protection measures should focus on small and medium floods (1:20 return period) while minimizing the risk of failure in larger floods; 6. The impacts of larger floods ( > 1:50) must be addressed through improved preparedness; 7. The impacts of climate change on flood frequencies are best addressed by focusing on growth not overdesign; and 8. Manage floods and droughts conjunctively. The National Guidelines weave these principles into Malawi’s approach to flood risk management through recommendations for planning and implementing flood prevention, protection and preparedness measures at district, traditional authority and village levels.

Keywords: flood risk management in low-income countries, sustainable development, investments in prevention, protection and preparedness, community-based flood risk management, Malawi

Procedia PDF Downloads 237
7382 Neural Network-based Risk Detection for Dyslexia and Dysgraphia in Sinhala Language Speaking Children

Authors: Budhvin T. Withana, Sulochana Rupasinghe

Abstract:

The problem of Dyslexia and Dysgraphia, two learning disabilities that affect reading and writing abilities, respectively, is a major concern for the educational system. Due to the complexity and uniqueness of the Sinhala language, these conditions are especially difficult for children who speak it. The traditional risk detection methods for Dyslexia and Dysgraphia frequently rely on subjective assessments, making it difficult to cover a wide range of risk detection and time-consuming. As a result, diagnoses may be delayed and opportunities for early intervention may be lost. The project was approached by developing a hybrid model that utilized various deep learning techniques for detecting risk of Dyslexia and Dysgraphia. Specifically, Resnet50, VGG16 and YOLOv8 were integrated to detect the handwriting issues, and their outputs were fed into an MLP model along with several other input data. The hyperparameters of the MLP model were fine-tuned using Grid Search CV, which allowed for the optimal values to be identified for the model. This approach proved to be effective in accurately predicting the risk of Dyslexia and Dysgraphia, providing a valuable tool for early detection and intervention of these conditions. The Resnet50 model achieved an accuracy of 0.9804 on the training data and 0.9653 on the validation data. The VGG16 model achieved an accuracy of 0.9991 on the training data and 0.9891 on the validation data. The MLP model achieved an impressive training accuracy of 0.99918 and a testing accuracy of 0.99223, with a loss of 0.01371. These results demonstrate that the proposed hybrid model achieved a high level of accuracy in predicting the risk of Dyslexia and Dysgraphia.

Keywords: neural networks, risk detection system, Dyslexia, Dysgraphia, deep learning, learning disabilities, data science

Procedia PDF Downloads 103
7381 Common Soccer Injuries and Its Risk Factors: A Systematic Review

Authors: C. Brandt, R. Christopher, N. Damons

Abstract:

Background: Soccer is one of the most common sports in the world. It is associated with a significant chance of injury either during training or during the course of an actual match. Studies on the epidemiology of soccer injuries have been widely conducted, but methodological appraisal is lacking to make evidence-based decisions. Objectives: The purpose of this study was to conduct a systematic review of common injuries in soccer and their risk factors. Methods: A systematic review was performed based on the Joanna Briggs Institute procedure for conducting systematic reviews. Databases such as SPORT Discus, Cinahl, Medline, Science Direct, PubMed, and grey literature were searched. The quality of selected studies was rated, and data extracted and tabulated. Plot data analysis was done, and incidence rates and odds ratios were calculated, with their respective 95% confidence intervals. I² statistic was used to determine the proportion of variation across studies. Results: The search yielded 62 studies, of which 21 were screened for inclusion. A total of 16 studies were included for the analysis, ten for qualitative and six for quantitative analysis. The included studies had, on average, a low risk of bias and good methodological quality. The heterogeneity amongst the pooled studies was, however, statistically significant (χ²-p value < 0.001). The pooled results indicated a high incidence of soccer injuries at an incidence rate of 6.83 per 1000 hours of play. The pooled results also showed significant evidence of risk factors and the likelihood of injury occurrence in relation to these risk factors (OR=1.12 95% CI 1.07; 1.17). Conclusion: Although multiple studies are available on the epidemiology of soccer injuries and risk factors, only a limited number of studies were of sound methodology to be included in a review. There was also significant heterogeneity amongst the studies. The incidence rate of common soccer injuries was found to be 6.83 per 1000 hours of play. This incidence rate is lower than the values reported by the majority of previous studies on the occurrence of common soccer injuries. The types of common soccer injuries found by this review support the soccer injuries pattern reported in existing literature as muscle strain and ligament sprain of varying severity, especially in the lower limbs. The risk factors that emerged from this systematic review are predominantly intrinsic risk factors. The risk factors increase the risk of traumatic and overuse injuries of the lower extremities such as hamstrings and groin strains, knee and ankle sprains, and contusion.

Keywords: incidence, prevalence, risk factors, soccer injuries

Procedia PDF Downloads 181
7380 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 139
7379 Assessment of the Groundwater Agricultural Pollution Risk: Case of the Semi-Arid Region (Batna-East Algeria)

Authors: Dib Imane, Chettah Wahid, Khedidja Abdelhamid

Abstract:

The plain of Gadaïne - Ain Yaghout, located in the wilaya of Batna (Eastern Algeria), experiences intensive human activities, particularly in agricultural practices which are accompanied by an increasing use of chemical fertilizers and manure. These activities lead to a degradation of the quality of water resources. In order to protect the quality of groundwater in this plain and formulate effective strategies to mitigate or avoid any contamination of groundwater, a risk assessment using the European method known as “COSTE Action 620” was applied to the mio-. plio-quaternary aquifer of this plain. Risk assessment requires the identification of existing dangers and their potential impact on groundwater by using a system of evaluation and weighting. In addition, it also requires the integration of the hydrogeological factors that influence the movement of contaminants by means of the intrinsic vulnerability maps of groundwater, which were produced according to the modified DRASTIC method. The overall danger on the plain ranges from very low to high. Farms containing stables, houses detached from the public sewer system, and sometimes manure piles were assigned a weighting factor expressing the highest degree of harmfulness; this created a medium to high danger index. Large areas for agricultural practice and grazing are characterized, successively, by low to very low danger. Therefore, the risks present at the study site are classified according to a range from medium to very high-risk intensity. These classes successively represent 3%, 49%, and 0.2% of the surface of the plain. Cultivated land and farms present a high to very high level of risk successively. In addition, with the exception of the salt mine, which presents a very high level of risk, the gas stations and cemeteries, as well as the railway line, represent a high level of risk.

Keywords: semi-arid, quality of water resources, risk assessment, vulnerability, contaminants

Procedia PDF Downloads 45
7378 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 465
7377 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 135
7376 Credit Risk Evaluation of Dairy Farming Using Fuzzy Logic

Authors: R. H. Fattepur, Sameer R. Fattepur, D. K. Sreekantha

Abstract:

Dairy Farming is one of the key industries in India. India is the leading producer and also the consumer of milk, milk-based products in the world. In this paper, we have attempted to the replace the human expert system and to develop an artificial expert system prototype to increase the speed and accuracy of decision making dairy farming credit risk evaluation. Fuzzy logic is used for dealing with uncertainty, vague and acquired knowledge, fuzzy rule base method is used for representing this knowledge for building an effective expert system.

Keywords: expert system, fuzzy logic, knowledge base, dairy farming, credit risk

Procedia PDF Downloads 358
7375 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 35
7374 Sexual Risk Behaviours among Patients Living with HIV/AIDS in Douala in 2012

Authors: Etienne Sugewe

Abstract:

Purpose: The establishment of a positive HIV serologic status of an individual could have been an inhibitory factor to prevent risk behaviours in people living with HIV/AIDS. We conducted a cross-sectional study in order to assess the prevalence and predictors of risk behaviors among HIV-positive people in Douala-Cameroon. Methods: We used pre-checked questionnaires to systematically collect data from four HIV treatment centers in Douala. This was done to some of them during the distribution of drugs and to others during their classical rendezvous between the months of May and July 2012. The Chi-Square and Student t-test were used for cross tabulation of variables; multiple regression analysis was performed to identify predictors of risky sexual behaviours. Results: Of the 330 persons interviewed, sixty percent were reported to have had sexual intercourse after the diagnosis of HIV. We obtained 37% HIV-positive partners, and 63% had HIV- negative partners or partners with unknown status. Among our patients, 45% of the subjects with regular partners reported to have had anal or vaginal sex. Those whose score on the knowledge about HIV/AIDS was < 50% and where 90% of them were less susceptible to the condom during intercourse (p: 0.01). About 74% of patients on ARV were less susceptible to the use of condoms during sexual intercourse (p: 0.03). Conclusion: Risk sexual behaviours among people living with HIV/AIDS are common and potentially expose their partners. For HIV-positive partners, these habits pose a real risk of suprainfection by other strains of HIV. The need to increase awareness and education among people living with HIV is therefore highly recommended.

Keywords: HIV/AIDS, behaviours, HIV positive, Douala, 2012

Procedia PDF Downloads 80
7373 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 148
7372 Sterilization Incident Analysis by the Association of Litigation and Risk Management Method

Authors: Souhir Chelly, Asma Ben Cheikh, Hela Ghali, Salwa Khefacha, Lamine Dhidah, Mohamed Ben Rejeb, Houyem Said Latiri

Abstract:

The hospital risk management department is firstly involved in the methodological analysis of grade zero sterilization incidents. The system is based on a subsequent analysis process in compliance with the ongoing requirements of the Haute Autorité de santé (HAS) for a reactive approach to risk, allowing to identify failures and start the appropriate preventive and corrective measures. The use of the association of litigation and risk management (ALARM) method makes easier the grade zero analysis and brings to light the team or institutional, organizational, temporal, individual factors representative of undesirable effects. Two main factors come out again from this analysis, pre-disinfection step of the emergency block unsupervised instrumentalist intern was poorly done since she did not remove the battery from micro air motor. At the sterilization unit, the worker who was not supervised by the nurse did the conditioning of the motor without having checked it if it still contained the battery. The main cause is that the management of human resources was inadequate at both levels, the instrumental trainee in the block who was not supervised by his supervisor and the worker of the sterilization unit who was not supervised by the responsible nurse. There is a lack of research help, advice, and collaboration. The difficulties encountered during this type of analysis are multiple. The first is based on its necessary acceptance by the various actors of care involved, which should not perceive it as a tool leading to individual punishment, but rather as a means to improve their practices.

Keywords: ALARM (Association of Litigation and Risk Management Method), incident, risk management, sterilization

Procedia PDF Downloads 212
7371 Spatial Planning Model on Landslide Risk Disaster at West Java Geothermal Field, Indonesia

Authors: Herawanti Kumalasari, Raldi Hendro Koestoer, Hayati Sari Hasibuan

Abstract:

Geographically, Indonesia is located in the arc of volcanoes that cause disaster prone one of them is landslide disaster. One of the causes of the landslide is the conversion of land from forest to agricultural land in upland areas and river border that has a steep slope. The study area is located in the highlands with fertile soil conditions, so most of the land is used as agricultural land and plantations. Land use transfer also occurs around the geothermal field in Pangalengan District, West Java Province which will threaten the sustainability of geothermal energy utilization and the safety of the community. The purpose of this research is to arrange the concept of spatial pattern arrangement in the geothermal area based on disaster mitigation. This research method using superimpose analysis. Superimpose analysis to know the basic physical condition of the planned area through the overlay of disaster risk map with the map of the plan of spatial plan pattern of Bandung Regency Spatial Plan. The results of the analysis will then be analyzed spatially. The results have shown that most of the study areas were at moderate risk level. Planning of spatial pattern of existing study area has not fully considering the spread of disaster risk that there are settlement area and the agricultural area which is in high landslide risk area. The concept of the arrangement of the spatial pattern of the study area will use zoning system which is divided into three zones namely core zone, buffer zone and development zone.

Keywords: spatial planning, geothermal, disaster risk, zoning

Procedia PDF Downloads 269
7370 Cross-Sectional Study of Critical Parameters on RSET and Decision-Making of At-Risk Groups in Fire Evacuation

Authors: Naser Kazemi Eilaki, Ilona Heldal, Carolyn Ahmer, Bjarne Christian Hagen

Abstract:

Elderly people and people with disabilities are recognized as at-risk groups when it comes to egress and travel from hazard zone to a safe place. One's disability can negatively influence her or his escape time, and this becomes even more important when people from this target group live alone. While earlier studies have frequently addressed quantitative measurements regarding at-risk groups' physical characteristics (e.g., their speed of travel), this paper considers the influence of at-risk groups’ characteristics on their decision and determining better escape routes. Most of evacuation models are based on mapping people's movement and their behaviour to summation times for common activity types on a timeline. Usually, timeline models estimate required safe egress time (RSET) as a sum of four timespans: detection, alarm, premovement, and movement time, and compare this with the available safe egress time (ASET) to determine what is influencing the margin of safety.This paper presents a cross-sectional study for identifying the most critical items on RSET and people's decision-making and with possibilities to include safety knowledge regarding people with physical or cognitive functional impairments. The result will contribute to increased knowledge on considering at-risk groups and disabilities for designing and developing safe escape routes. The expected results can be an asset to predict the probabilistic behavioural pattern of at-risk groups and necessary components for defining a framework for understanding how stakeholders can consider various disabilities when determining the margin of safety for a safe escape route.

Keywords: fire safety, evacuation, decision-making, at-risk groups

Procedia PDF Downloads 96
7369 Ecological Risk Assessment of Informal E-Waste Processing in Alaba International Market, Lagos, Nigeria

Authors: A. A. Adebayo, O. Osibanjo

Abstract:

Informal electronic waste (e-waste) processing is a crude method of recycling, which is on the increase in Nigeria. The release of hazardous substances such as heavy metals (HMs) into the environment during informal e-waste processing has been a major concern. However, there is insufficient information on environmental contamination from e-waste recycling, associated ecological risk in Alaba International Market, a major electronic market in Lagos, Nigeria. The aims of this study were to determine the levels of HMs in soil, resulting from the e-waste recycling; and also assess associated ecological risks in Alaba international market. Samples of soils (334) were randomly collected seasonally for three years from fourteen selected e-waste activity points and two control sites. The samples were digested using standard methods and HMs analysed by inductive coupled plasma optical emission. Ecological risk was estimated using Ecological Risk index (ER), Potential Ecological Risk index (RI), Index of geoaccumulation (Igeo), Contamination factor (Cf) and degree of contamination factor (Cdeg). The concentrations range of HMs (mg/kg) in soil were: 16.7-11200.0 (Pb); 14.3-22600.0 (Cu); 1.90-6280.0 (Ni), 39.5-4570.0 (Zn); 0.79-12300.0 (Sn); 0.02-138.0 (Cd); 12.7-1710.0 (Ba); 0.18-131.0 (Cr); 0.07-28.0 (V), while As was below detection limit. Concentrations range in control soils were 1.36-9.70 (Pb), 2.06-7.60 (Cu), 1.25-5.11 (Ni), 3.62-15.9 (Zn), BDL-0.56 (Sn), BDL-0.01 (Cd), 14.6-47.6 (Ba), 0.21–12.2 (Cr) and 0.22-22.2 (V). The trend in ecological risk index was in the order Cu > Pb > Ni > Zn > Cr > Cd > Ba > V. The potential ecological risk index with respect to informal e-waste activities were: burning > dismantling > disposal > stockpiling. The index of geo accumulation indices revealed that soils were extremely polluted with Cd, Cu, Pb, Zn and Ni. The contamination factor indicated that 93% of the studied areas have very high contamination status for Pb, Cu, Ba, Sn and Co while Cr and Cd were in the moderately contaminated status. The degree of contamination decreased in the order of Sn > Cu > Pb >> Zn > Ba > Co > Ni > V > Cr > Cd. Heavy metal contamination of Alaba international market environment resulting from informal e-waste processing was established. Proper management of e-waste and remediation of the market environment are recommended to minimize the ecological risks.

Keywords: Alaba international market, ecological risk, electronic waste, heavy metal contamination

Procedia PDF Downloads 194
7368 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 135
7367 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 503