Search results for: security test institutionalization
10937 Opportunities of Diversification Strategy Investment among the Top Ten Cryptocurrencies in Crypto Industry
Authors: Surayyo Shaamirova, Anwar Hasan Abdullah Othman
Abstract:
This study investigates the co-integration association between the top 10 cryptocurrencies, namely Bitcoin, Ethereum, Ripple, Bitcoin Cash, EOS, Cardano, Litecoin, Stellar, IOTA, and NEO. The study applies Johansen Juselius co-integration test to examine the long-run co-integration and utilize the Engle and Granger casualty test to examine the short-run relationship. The findings of the study show that there is a strong co-integration relationship among the cryptocurrencies; however, in the short run, there is no causal relationship among the crypto currencies. These results, therefore, suggest that there are portfolio diversification opportunities in the cryptocurrencies industry when it comes to long run investment decisions, on the other hand, the cryptocurrencies industry shows the characteristics of efficiency in the short-run. This is an indication of a non-speculation investment in the cryptocurrencies industry in the short term investment.Keywords: cryptocurrencies, Johansen-Juselius co-integration test, Engle and Granger casualty test, portfolio diversification
Procedia PDF Downloads 14010936 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 15410935 Application of Gene Expression Programming (GEP) in Predicting Uniaxial Compressive Strength of Pyroclastic Rocks
Authors: İsmail İnce, Mustafa Fener, Sair Kahraman
Abstract:
The uniaxial compressive strength (UCS) of rocks is an important input parameter for the design of rock engineering project. Compressive strength can be determined in the laboratory using the uniaxial compressive strength (UCS) test. Although the test is relatively simple, the method is time consuming and expensive. Therefore many researchers have tried to assess the uniaxial compressive strength values of rocks via relatively simple and indirect tests (e.g. point load strength test, Schmidt Hammer hardness rebound test, P-wave velocity test, etc.). Pyroclastic rocks are widely exposed in the various regions of the world. Cappadocia region located in the Central Anatolia is one of the most spectacular cite of these regions. It is important to determine the mechanical behaviour of the pyroclastic rocks due to their ease of carving, heat insulation properties and building some civil engineering constructions in them. The purpose of this study is to estimate a widely varying uniaxial strength of pyroclastic rocks from Cappadocia region by means of point load strength, porosity, dry density and saturated density tests utilizing gene expression programming.Keywords: pyroclastic rocks, uniaxial compressive strength, gene expression programming (GEP, Cappadocia region
Procedia PDF Downloads 34210934 Test of Moisture Sensor Activation Speed
Authors: I. Parkova, A. Vališevskis, A. Viļumsone
Abstract:
Nocturnal enuresis or bed-wetting is intermittent incontinence during sleep of children after age 5 that may precipitate wide range of behavioural and developmental problems. One of the non-pharmacological treatment methods is the use of a bed-wetting alarm system. In order to improve comfort conditions of nocturnal enuresis alarm system, modular moisture sensor should be replaced by a textile sensor. In this study behaviour and moisture detection speed of woven and sewn sensors were compared by analysing change in electrical resistance after solution (salt water) was dripped on sensor samples. Material of samples has different structure and yarn location, which affects solution detection rate. Sensor system circuit was designed and two sensor tests were performed: system activation test and false alarm test to determine the sensitivity of the system and activation threshold. Sewn sensor had better result in system’s activation test – faster reaction, but woven sensor had better result in system’s false alarm test – it was less sensitive to perspiration simulation. After experiments it was found that the optimum switching threshold is 3V in case of 5V input voltage, which provides protection against false alarms, for example – during intensive sweating.Keywords: conductive yarns, moisture textile sensor, industry, material
Procedia PDF Downloads 24710933 Role of Preoperative and Postoperative Endovaginal Ultrasound and 24-Hour Pad Test in Evaluation of Efficacy of Various Treatment Modalities for Stress Urinary Incontinence
Authors: J. B. Sharma, Vivek Kakkar, Sunesh Kumar, K. K. Roy, Rajesh Kumari, Kavita Pandey, Smriti Hari
Abstract:
Background: Stress urinary incontinence (SUI) is a common problem affecting the quality of life of women. Methods: It is a prospective study conducted over 40 women of SUI by endovaginal ultrasound on rest and Valsalva preoperatively and six months postoperatively for levator hiatus, pubovisceral thickness, urethral length, and bladder neck position. A 24-hour pad test was also performed on all women at the same time for grading of SUI. Treatment given was medical in 4 (10%), Burch colposuspension in 18 (45%), and tension-free obturator tape in 18 (45%). Results: Mean age, parity, and body mass index in the study were 41.60 years, 2.73, and 24.2 kg/m², respectively. All 40 (100%) patients had SUI, with the mean duration of symptoms being 4.04 years. On the 24-hour pad test, mild SUI was in 4 (10%), moderate SUI in 33 (82.5%), and severe SUI in 3 (7.5%), with mean preoperative 24-hour pad test being 36.69 gm which significantly reduced to 9.79 gm postoperatively (p 0.001). There was a significant change in levator hiatus and pubovisceral thickness with the treatment of SUI. Overall urethral length increased, but there was a significant decrease in urethral length on Valsalva after the treatment (0.40 versus 0.28 cm, p 0.04) and a significant reduction in bladder neck descent after Valsalva after treatment (0.41 cm versus 0.27 cm, p 0.001). Conclusion: Endovaginal ultrasound and 24-hour pad test are useful diagnostic modalities for SUI diagnosis and to see the impact of treatment.Keywords: stress urinary incontinence, endovaginal ultrasound, 24-hours pad test, pubovisceral muscle thickness
Procedia PDF Downloads 9610932 Machine Learning Approach for Mutation Testing
Authors: Michael Stewart
Abstract:
Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%.Keywords: automated-testing, machine learning, mutation testing, parallel processing, reinforcement learning, software engineering, software testing
Procedia PDF Downloads 20110931 Prevalence of Treponema pallidum Infection among HIV-Seroreactive Patients in Kano, Nigeria
Authors: Y. Mohammed, A. I. Kabuga
Abstract:
Sexually transmitted infections (STIs) have continued to be a major public health problem in sub-Saharan Africa especially with the recent resurgence of syphilis. Syphilis is a systemic disease caused by the bacterium, spirochete Treponema pallidum and has been reported as one of the common sexually transmitted infections (STIs) in Nigeria. Presence of genital ulcer disease from syphilis facilitates human immunodeficiency virus (HIV) transmission and their ¬diagnosis is essential for the proper management. Venereal Disease Research Laboratory (VDRL) test is used as a screening test for the diagnosis of syphilis. However, unusual VDRL test results have been reported in HIV-infected persons with syphilis. There are reports showing higher than expected VDRL titers as well as biological false positive in most of the studies. A negative Rapid Plasma Reagin (RPR) test or VDRL test result may not rule out syphilis in patients with HIV infection. For laboratory confirmation of syphilis, one specific Treponemal test, namely, Fluroscent Treponemal Antibody Absorption (FTA-ABS) test or Treponema Pallidum Haemagglutination Assay (TPHA) should be done along with VDRL. A prospective cross sectional study was conducted for 2 years from Jun, 2012 to Jun 2014 to determine the prevalence of syphilis in HIV-seroreactive patients at 5 selected HIV/AIDS treatment and counseling centers in Kano State, North Western, Nigeria. New HIV-Seroreactive patients who gave informed consent to participate in the study were recruited. Venereal Diseases Research Laboratory (VDRL) test for Syphilis screening was performed on the same sera samples which were collected for HIV testing. A total of 238 patients, 113 (47%) males and 125 (53%) females, were enrolled. In the present study, 238 HIV-seropositive patients were screened for syphilis by VDRL test. Out of these 238 cases, 72 (32%) patients were positive for TPHA and 8 (3.4%) patients were reactive for VDRL in various titers with an overall prevalence of 3.4%. All the eight patients who were reactive for VDRL test were also positive for TPHA test. In Conclusions, with high prevalence of syphilis among HIV-infected people from this study, it is recommended that serological testing for syphilis should be carried out in all patients with newly diagnosed HIV infection. Detection and treatment of STI should have a central role in HIV prevention and control. This will help in proper management of patients having STIs and HIV co infection.Keywords: HIV, infections, STIs, syphilis
Procedia PDF Downloads 32210930 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 10310929 Kazakh Language Assessment in a New Multilingual Kazakhstan
Authors: Karlygash Adamova
Abstract:
This article is focused on the KazTest as one of the most important high-stakes tests and the key tool in Kazakh language assessment. The research will also include the brief introduction to the language policy in Kazakhstan. Particularly, it is going to be changed significantly and turn from bilingualism (Kazakh, Russian) to multilingual policy (three languages - Kazakh, Russian, English). Therefore, the current status of the abovementioned languages will be described. Due to the various educational reforms in the country, the language evaluation system should also be improved and moderated. The research will present the most significant test of Kazakhstan – the KazTest, which is aimed to evaluate the Kazakh language proficiency. Assessment is an ongoing process that encompasses a wide area of knowledge upon the productive performance of the learners. Test is widely defined as a standardized or standard method of research, testing, diagnostics, verification, etc. The two most important characteristics of any test, as the main element of the assessment - validity and reliability - will also be described in this paper. Therefore, the preparation and design of the test, which is assumed to be an indicator of knowledge, and it is highly important to take into account all these properties.Keywords: multilingualism, language assessment, testing, language policy
Procedia PDF Downloads 13910928 Estimation of Tensile Strength for Granitic Rocks by Using Discrete Element Approach
Authors: Aliakbar Golshani, Armin Ramezanzad
Abstract:
Tensile strength which is an important parameter of the rock for engineering applications is difficult to measure directly through physical experiment (i.e. uniaxial tensile test). Therefore, indirect experimental methods such as Brazilian test have been taken into consideration and some relations have been proposed in order to obtain the tensile strength for rocks indirectly. In this research, to calculate numerically the tensile strength for granitic rocks, Particle Flow Code in three-dimension (PFC3D) software were used. First, uniaxial compression tests were simulated and the tensile strength was determined for Inada granite (from a quarry in Kasama, Ibaraki, Japan). Then, by simulating Brazilian test condition for Inada granite, the tensile strength was indirectly calculated again. Results show that the tensile strength calculated numerically agrees well with the experimental results obtained from uniaxial tensile tests on Inada granite samples.Keywords: numerical simulation, particle flow code, PFC, tensile strength, Brazilian Test
Procedia PDF Downloads 19310927 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
Authors: Michelle D. Hand, Michelle L. Kaiser
Abstract:
African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu
Procedia PDF Downloads 27510926 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment
Authors: Atma Sahu
Abstract:
After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems
Procedia PDF Downloads 9610925 Post Covid-19 Scenario and Contemporary International Security Challenges
Authors: Rubina Waseem
Abstract:
The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.Keywords: covid-19, global challenges, international politics, international security
Procedia PDF Downloads 16410924 Research on the Feasibility of Evaluating Low-Temperature Cracking Performance of Asphalt Mixture Using Fracture Energy
Authors: Tao Yang, Yongli Zhao
Abstract:
Low-temperature cracking is one of the major challenges for asphalt pavement in the cold region. Fracture energy could determine from various test methods, which is a commonly used parameter to evaluate the low-temperature cracking resistance of asphalt mixture. However, the feasibility of evaluating the low-temperature cracking performance of asphalt mixture using fracture energy is not investigated comprehensively. This paper aims to verify whether fracture energy is an appropriate parameter to evaluate the low-temperature cracking performance. To achieve this goal, this paper compared the test results of thermal stress restrained specimen test (TSRST) and semi-circular bending test (SCB) of asphalt mixture with different types of aggregate, TSRST and indirect tensile test (IDT) of asphalt mixture with different additives, and single-edge notched beam test (SENB) and TSRST of asphalt mixture with different asphalt. Finally, the correlation between in-suit cracking performance and fracture energy was surveyed. The experimental results showed the evaluation result of critical cracking temperature and fracture energy are not always consistent; the in-suit cracking performance is also not correlated well with fracture energy. These results indicated that it is not feasible to evaluate low-temperature performance by fracture energy. Then, the composition of fracture energy of TSRST, SCB, disk-shaped compact tension test (DCT), three-point bending test (3PB) and IDT was analyzed. The result showed: the area of thermal stress versus temperature curve is the multiple of fracture energy and could be used to represent fracture energy of TSRST, as the multiple is nearly equal among different asphalt mixtures for a specific specimen; the fracture energy, determined from TSRST, SCB, DCT, 3PB, SENB and IDT, is mainly the surface energy that forms the fracture face; fracture energy is inappropriate to evaluate the low-temperature cracking performance of asphalt mixture, as the relaxation/viscous performance is not considered; if the fracture energy was used, it is recommended to combine this parameter with an index characterizing the relaxation or creep performance of asphalt mixture.Keywords: asphalt pavement, cold region, critical cracking temperature, fracture energy, low-temperature cracking
Procedia PDF Downloads 19010923 A Study on the Synthetic Resin of Fire Risk Using the Room Corner Test
Authors: Ji Hun Choi, Seung Un Chae, Kyeong Suk Cho
Abstract:
Synthetic resins are widely used in various fields including electricity, engineering, construction and agriculture. Many of interior and exterior finishing materials for buildings are synthetic resin products. In this study, full-scale fire tests were conducted on polyvinyl chloride, polypropylene and urethane in accordance with the “ISO 9705: Fire test - Full-scale room test for surface products” to measure heat release rate, toxic gas emission and smoke production rate. Based on the tests, fire growth pattern and fire risk were analyzed. Findings from the tests conducted on polyvinyl chloride and urethane are as follows. The total heat release rate and total smoke production rate of polyvinyl chloride were 98.89MW and 5284.41m2, respectively and its highest CO2 concentration was 0.149%. The values obtained from the test with urethane were 469.94 MW, 3396.28 m2 and 1.549%. While heat release rate and CO2 concentration were higher in urethane implying its high combustibility, smoke production rate was 1.5 times higher in polyvinyl chloride. Follow-up tests are planned to be conducted to accumulate data for the evaluation of heat emission and fire risk associated with synthetic resins.Keywords: synthetic resins, fire test, full-scale test, heat release rate, smoke production rate, polyvinyl chloride, polypropylene, urethane
Procedia PDF Downloads 43310922 Neuropsychological Testing in a Multi-Lingual Society: Normative Data for South African Adults in More Than Eight Languages
Authors: Sharon Truter, Ann B. Shuttleworth-Edwards
Abstract:
South Africa is a developing country with significant diversity in languages spoken and quality of education available, creating challenges for fair and accurate neuropsychological assessments when most available neuropsychological tests are obtained from English-speaking developed countries. The aim of this research was to compare normative data on a spectrum of commonly used neuropsychological tests for English- and Afrikaans-speaking South Africans with relatively high quality of education and South Africans with relatively low quality of education who speak Afrikaans, Sesotho, Setswana, Sepedi, Tsonga, Venda, Xhosa or Zulu. The participants were all healthy adults aged 18-60 years, with 8-12 years of education. All the participants were tested in their first language on the following tests: two non-verbal tests (Rey Osterrieth Complex Figure Test and Bell Cancellation Test), four verbal fluency tests (category, phonemic, verb and 'any words'), one verbal learning test (Rey Auditory Verbal Leaning Test) and three tests that have a verbal component (Trail Making Test A & B; Symbol Digit Modalities Test and Digit Span). Descriptive comparisons of mean scores and standard deviations across the language groups and between the groups with relatively high versus low quality of education highlight the importance of using normative data that takes into account language and quality of education.Keywords: cross-cultural, language, multi-lingual, neuropsychological testing, quality of education
Procedia PDF Downloads 17810921 Developing Norms for Sit and Reach Test in the Local Environment of Khyber Pakhtunkhwa, Pakistan
Authors: Hazratullah Khattak, Abdul Waheed Mughal, Inamullah Khattak
Abstract:
This study is envisaged as vital contribution as it intends to develop norms for the Sit and Reach Test in the Local Environment of Khyber Pakhtunkhwa Pakistan, for the age group between 12-14 years which will be used to measure the flexibility level of early adolescents (12-14 years). Sit and Reach test was applied on 2000 volunteers, 400 subjects from each selected district (Five (5) Districts, Peshawar, Nowshera, Karak, Dera Ismail Khan and Swat (20% percent of the total 25 districts) using convenient sampling technique. The population for this study is comprised of all the early adolescents aging 12-14 years (Age Mean 13 + 0.63, Height 154 + 046, Weight 46 + 7.17, BMI 19 + 1.45) representing various public and private sectors educational institutions of the Khyber Pakhtunkhwa. As for as the norms developed for Sit and Reach test, the score below 6.8 inches comes in the category of poor, 6.9 to 9.6 inches (below Average), 9.7 to 10.8 inches (Average), 10.9 to 13 inches (Above average) and above 13 inches score is considered as Excellent.Keywords: fitness, flexibility, norms, sit and reach
Procedia PDF Downloads 28110920 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 34510919 A User Interface for Easiest Way Image Encryption with Chaos
Authors: D. López-Mancilla, J. M. Roblero-Villa
Abstract:
Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.Keywords: image encryption, chaos, secure communications, user interface
Procedia PDF Downloads 49310918 Smuggling of Migrants as an Influential Factor on National Security, Economic and Social Life
Authors: Jordan Georgiev Deliversky
Abstract:
Human trafficking and smuggling of migrants are criminal activities, which are on the rise over recent years. The number of legal migrants arrived in Europe from outside the European Union are far less than those who want to come and settle in Europe. The objective of this paper is to present the impact on economic and social life of significant measures influencing the smuggling of migrants. The analysis is focused on various complex factors which have multiple origins and are highly influential as regard to the process of migration and the smuggling of migrants. The smuggling of migrants is a criminal activity, directly related to migration. The main results show that often the routes chosen for smuggling of migrants are circuitous, as smugglers carefully avoid strictly controlled roads, checkpoints, and countries or jurisdictions where there is efficiency of justice, with particular emphasis on the law on trafficking of persons and smuggling of migrants.Keywords: corruption, migration, security, smuggling
Procedia PDF Downloads 26610917 Challenges of Implementing Participatory Irrigation Management for Food Security in Semi Arid Areas of Tanzania
Authors: Pilly Joseph Kagosi
Abstract:
The study aims at assessing challenges observed during the implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation, and literature review. Data collected from the questionnaire was analysed using SPSS while PRA data was analysed with the help of local communities during PRA exercise. Data from other methods were analysed using content analysis. The study revealed that PIM approach has a contribution in improved food security at household level due to the involvement of communities in water management activities and decision making which enhanced the availability of water for irrigation and increased crop production. However, there were challenges observed during the implementation of the approach including; minimum participation of beneficiaries in decision-making during planning and designing stages, meaning inadequate devolution of power among scheme owners. Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However, it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.Keywords: challenges, participatory approach, irrigation management, food security, semi arid areas
Procedia PDF Downloads 32710916 Cryptographic Protocol for Secure Cloud Storage
Authors: Luvisa Kusuma, Panji Yudha Prakasa
Abstract:
Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.Keywords: cloud storage, security, cryptographic protocol, artificial intelligence
Procedia PDF Downloads 35810915 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 15310914 Resilient Regions for Purpose of Crisis Management
Authors: Jana Gebhartova, Tomas Duda, Ivan Benes
Abstract:
World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies
Procedia PDF Downloads 37910913 The Effect of Using Mobile Listening Applications on Listening Skills of Iranian Intermediate EFL Learners
Authors: Mahmoud Nabilu
Abstract:
The present study explored the effect of using Mobile listening applications on developing listening skills by Iranian intermediate EFL learners. Fifty male intermediate English learners whose age range was between 15 and 20, participated in the study. The participants were placed in two groups on the basis of their scores on a placement test. Therefore, the participants of the study were homogenized in terms of general proficiency, and groups were assigned as one experimental group and one control group. The experimental group was instructed by the treatment which was using mobile applications to develop their listening skills while the control group received traditional methods. The research data were obtained from the 40-item multiple-choice tests as a pre-test and a post-test. The results of the t-test clearly revealed that the learners in the experimental group performed better in the post-test than the pre-test. This implies that using a mobile application for developing listening skills as a treatment was effective in helping the language learners perform better on post-test. However, a statistically significant difference was found between the post-tests scores of the two groups. The mean of the experimental group was greater compared to the control group. The participants were Iranian and from an Iranian Language Institute, so care should be taken while generalizing the results to the learners of other nationalities. However, in the researcher's view, the findings of this study have valuable implications for teachers and learners, methodologists and syllabus designers, linguists and MALL/CALL (mobile/computer-assisted language learning) experts. Using the result of the present paper is an aim of raising the consciousness of a better technique of developing listening skills in order to make language learning more efficient for the learners.Keywords: Mobile listening applications, intermediate EFL learners, MALL, CALL
Procedia PDF Downloads 19510912 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations
Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan
Abstract:
Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques
Procedia PDF Downloads 8310911 Social Safety Net and Food Security Among Farming Household in Southwest, Nigeria
Authors: Adepoju A. A., Raufu M. O., Ganiyu M. O., Olawuyi S. O., Olalere J. O., Ogunkunle A. A.
Abstract:
This study investigated the effects of social safety nets on food security among farming households in Southwest Nigeria. The study used a multistage sampling technique, purposively selecting two states from southwest Nigeria, Oyo and Ogun as the study area with eight Agricultural Development Programme (ADP) agricultural zones. The Local Government Areas (LGAs) were stratified into urban and rural LGAs. Sixteen villages from Oyo and 12 villages from Ogun were randomly selected from the rural LGAs using a proportionate to-size sampling, resulting in 472 respondents, with 271 and 201 from Oyo and Ogun states, respectively. The data was analyzed using descriptive statistics like mean, standard deviation, frequency and percentages, while logistic regression analysis examines the association between independent variables and dependent variables. The study found that poverty reduction, social empowerment, food security palliative, microcredit, and agricultural empowerment are the most prevalent social safety nets among farming households. School feed programs are the most prevalent form of poverty reduction, while training for empowerment improves wellbeing. Food item distribution is the most beneficial for food security and wellbeing. Self-empowerment-based micro-credit support is the most effective, while Anchor Borrower's project is the most beneficial for agricultural empowerment. The study found that 62.68% of the variance in food security status is explained by independent variables. females farmers have a 56% higher likelihood of being food secure than their male counterparts. An additional increase in age decreases the likelihood of being food secure by 6%. Married individuals have a 58% lower likelihood of being food secure compared to singles, possibly due to increased financial responsibilities. A larger household size increases the likelihood of being food secure by 3.41%. Larger households may benefit from economies of scale or shared resources and social safety net programs. Engagement in farming as a primary occupation increases the likelihood of being food secure by 62%. The study further reveals that participation in poverty reduction and microcredit programs significantly increases the likelihood of food security by 30,069% and 135.48%, respectively. The study therefore recommends expanding school feed programs, improving empowerment training, strengthening food distribution, promoting micro-credit, supporting agricultural empowerment, and addressing gender disparities in social safety net programs.Keywords: poverty reduction, food distribution, micro-credit, household well-being
Procedia PDF Downloads 1410910 Biochar and Food Security in Central Uganda
Authors: Nataliya Apanovich, Mark Wright
Abstract:
Uganda is among the poorest but fastest growing populations in the world. Its annual population growth of 3% puts additional stress through land fragmentation, agricultural intensification, and deforestation on already highly weathered tropical (Ferralsol) soils. All of these factors lead to decreased agricultural yields and consequently diminished food security. The central region of Uganda, Buganda Kingdom, is especially vulnerable in terms of food security as its high population density coupled with mismanagement of natural resources led to gradual loss of its soil and even changes in microclimate. These changes are negatively affecting livelihoods of smallholder farmers who comprise 80% of all population in Uganda. This research focuses on biochar for soil remediation in Masaka District, Uganda. If produced on a small scale from locally sourced materials, biochar can increase the quality of soil in a cost and time effective manner. To assess biochar potential, 151 smallholder farmers were interviewed on the types of crops grown, agricultural residues produced and their use, as well as on attitudes towards biochar use and its production on a small scale. The interviews were conducted in 7 sub-counties, 32 parishes, and 92 villages. The total farmland covered by the study was 606.2 kilometers. Additional information on the state of agricultural development and environmental degradation in the district was solicited from four local government officials via informal interviews. This project has been conducted in collaboration with the international agricultural research institution, Makerere University in Kampala, Uganda. The results of this research can have implications on the way farmers perceive the value of their agricultural residues and what they decide to do with them. The underlying objective is to help smallholders in degraded soils increase their agricultural yields through the use of biochar without diverting the already established uses of agricultural residues to a new soil management practice.Keywords: agricultural residues, biochar, central Uganda, food security, soil erosion, soil remediation
Procedia PDF Downloads 28410909 Hybrid Obfuscation Technique for Reverse Engineering Problem
Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro
Abstract:
Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.Keywords: intellectual property, obfuscation, software security, reverse engineering
Procedia PDF Downloads 14810908 Physical Fitness Activities for Elementary School Pupils of Matacon Elementary School
Authors: Ariel B. Domagsang
Abstract:
This study dealt with the physical fitness activities for elementary school pupils of Matacon Elementary School, Polangui South District, Albay Division are presented in this chapter. Specifically, it looked into the pre-post test performance based on the Physical Fitness Test which were subjected to statistical significant test of difference including health- and skill-related improvement. Finally, it came up with physical fitness activities to improve the physical fitness performance of the pupils. The descriptive method through survey using questionnaire-checklist, unstructured interview and document(ary) analysis were utilized in this research. There were 171 grades five and six pupil participants in this undertaking.Keywords: Matakon, fitness acitivities, elementary schools, physical fitness of pupils
Procedia PDF Downloads 535