Search results for: security test institutionalization
10907 An Experimental Study of Bolt Inclination in a Composite Single Bolted Joint
Authors: Youcef Faci, Djillali Allou, Ahmed Mebtouche, Badredine Maalem
Abstract:
The inclination of the bolt in a fastened joint of composite material during a tensile test can be influenced by several parameters, including material properties, bolt diameter and length, the type of composite material being used, the size and dimensions of the bolt, bolt preload, surface preparation, the design and configuration of the joint, and finally testing conditions. These parameters should be carefully considered and controlled to ensure accurate and reliable results during tensile testing of composite materials with fastened joints. Our work focuses on the effect of the stacking sequence and the geometry of specimens. An experimental test is carried out to obtain the inclination of a bolt during a tensile test of a composite material using acoustic emission and digital image correlation. Several types of damage were obtained during load. Digital image correlation techniques permit to obtain the inclination of bolt angle value during tensile test. We concluded that the inclination of the bolt during a tensile test of a composite material can be related to the damage that occurs in the material. It can cause stress concentrations and localized deformation in the material, leading to damage such as delamination, fiber breakage, matrix cracking, and other forms of failure.Keywords: damage, digital image correlation, bolt inclination angle, joint
Procedia PDF Downloads 7110906 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.Keywords: discrete wavelet transforms, AES, dynamic SBox
Procedia PDF Downloads 43310905 Radio Based Location Detection
Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw
Abstract:
Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost
Procedia PDF Downloads 51910904 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting
Authors: Yanmin Zhao, Siu Ming Yiu
Abstract:
To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures
Procedia PDF Downloads 13310903 Study on 3D FE Analysis on Normal and Osteoporosis Mouse Models Based on 3-Point Bending Tests
Authors: Tae-min Byun, Chang-soo Chon, Dong-hyun Seo, Han-sung Kim, Bum-mo Ahn, Hui-suk Yun, Cheolwoong Ko
Abstract:
In this study, a 3-point bending computational analysis of normal and osteoporosis mouse models was performed based on the Micro-CT image information of the femurs. The finite element analysis (FEA) found 1.68 N (normal group) and 1.39 N (osteoporosis group) in the average maximum force, and 4.32 N/mm (normal group) and 3.56 N/mm (osteoporosis group) in the average stiffness. In the comparison of the 3-point bending test results, the maximum force and the stiffness were different about 9.4 times in the normal group and about 11.2 times in the osteoporosis group. The difference between the analysis and the test was greatly significant and this result demonstrated improvement points of the material properties applied to the computational analysis of this study. For the next study, the material properties of the mouse femur will be supplemented through additional computational analysis and test.Keywords: 3-point bending test, mouse, osteoporosis, FEA
Procedia PDF Downloads 35310902 The Use of Five Times Sit-To-Stand Test in Ambulatory People with Spinal Cord Injury When Tested with or without Hands
Authors: Lalita Khuna, Sugalya Amatachaya, Pipatana Amatachaya, Thiwabhorn Thaweewannakij, Pattra Wattanapan
Abstract:
The five times sit-to-stand test (FTSST) has been widely used to quantify lower extremity motor strength (LEMS), dynamic balance ability, and risk of falls in many individuals. Recently, it has been used in ambulatory patients with spinal cord injury (SCI) but variously using with or without hands according to patients’ ability. This difference might affect the validity of the test in these individuals. Thus, this study assessed the concurrent validity of the FTSST in ambulatory individuals with SCI, separately for those who could complete the test with or without hands using LEMS and standard functional measures as gold standards. Moreover, the data of the tests from those who completed the FTSST with and without hands were compared. A total of 56 ambulatory participants with SCI who could complete sit-to-stand with or without hands were assessed for the time to complete the FTSST according to their ability. Then they were assessed for their LEMS scores and functional abilities, including the 10-meter walk test (10MWT), the walking index for spinal cord injury II (WISCI II), the timed up and go test (TUGT), and the 6-minute walk test (6MWT). The Mann-Whitney U test was used to compare the different findings between the participants who performed the FTSST with and without hands. The Spearman rank correlation coefficient (ρ) was applied to analyze the levels of correlation between the FTSST and standard tests (LEMS scores and functional measures). There were significant differences in the data between the participants who performed the test with and without hands (p < 0.01). The time to complete the FTSST of the participants who performed the test without hands showed moderate to strong correlation with total LEMS scores and all functional measures (ρ = -0.71 to 0.69, p < 0.001). On the contrary, the FTSST data of those who performed the test with hands were significantly correlated only with the 10MWT, TUGT, and 6MWT (ρ = -0.47 to 0.57, p < 0.01). The present findings confirm the concurrent validity of the FTSST when performed without hands for LEMS and functional mobility necessary for the ability of independence and safety of ambulatory individuals with SCI. However, the test using hands distort the ability of the outcomes to reflect LEMS and WISCI II that reflect lower limb functions. By contrast, the 10MWT, TUGT, and 6MWT allowed upper limb contribution in the tests. Therefore, outcomes of these tests showed a significant correlation to the outcomes of FTSST when assessed using hands. Consequently, the use of FTSST with or without hands needs to consider the clinical application of the outcomes, i.e., to reflect lower limb functions or mobility of the patients.Keywords: mobility, lower limb muscle strength, clinical test, rehabilitation
Procedia PDF Downloads 15410901 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria
Authors: Babatunde Oluwamayokun Soyoye
Abstract:
This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.Keywords: design and fabrication, food security, grain crop, motorized planter
Procedia PDF Downloads 13710900 Camera Model Identification for Mi Pad 4, Oppo A37f, Samsung M20, and Oppo f9
Authors: Ulrich Wake, Eniman Syamsuddin
Abstract:
The model for camera model identificaiton is trained using pretrained model ResNet43 and ResNet50. The dataset consists of 500 photos of each phone. Dataset is divided into 1280 photos for training, 320 photos for validation and 400 photos for testing. The model is trained using One Cycle Policy Method and tested using Test-Time Augmentation. Furthermore, the model is trained for 50 epoch using regularization such as drop out and early stopping. The result is 90% accuracy for validation set and above 85% for Test-Time Augmentation using ResNet50. Every model is also trained by slightly updating the pretrained model’s weightsKeywords: One Cycle Policy, ResNet34, ResNet50, Test-Time Agumentation
Procedia PDF Downloads 20910899 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 29410898 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria
Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria
Abstract:
The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.Keywords: dental surgeon, medical devices, sterilization, survey
Procedia PDF Downloads 40210897 The Modeling of City Bus Fuel Economy during the JE05 Emission Test Cycle
Authors: Miroslaw Wendeker, Piotr Kacejko, Marcin Szlachetka, Mariusz Duk
Abstract:
This paper discusses a model of fuel economy in a city bus driving in a dynamic urban environment. Rapid changes in speed result in a constantly changing kinetic energy accumulated in a bus mass and an increased fuel consumption due to hardly recuperated kinetic energy. The model is based on the bench test results achieved from chassis dynamometer, airport and city street researches. The verified model was applied to simulate the behavior of a bus during the Japanese JE05 Emission Test Cycle. The fuel consumption was calculated for three separate research stages, i.e. urban, downtown and motorway. The simulations were performed for several values of vehicle mass and electrical load applied to on-board devices. The research results show fuel consumption is impacted by driving dynamics.Keywords: city bus, heavy duty vehicle, Japanese JE05 test cycle, kinetic energy
Procedia PDF Downloads 31710896 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 6910895 Analysis of the Variation on Earth Pressure by Addition of Construction Demolition Waste (C&D Waste) In Black Cotton Soil
Authors: Nirav Jadav, M. G.Vanza
Abstract:
Black cotton soils mainly exhibit the property of swelling/shrinkage when they react to moisture variations. This property causes development of cracks in the structures resting on these soils, which poses instability to the structures. Soil stabilization is a technique to enhance the geotechnical characteristics of Black cotton soils by changing their properties. Due to rapid growth in construction industry, a lot of waste material is being generated every day, which poses the problem of its disposal. If the waste material can be utilized for soil stabilization, it will mitigate the problems of its disposal. The tests results evaluate that the strength of the Black cotton soils increased by the use of C&D waste material. This study determines various Index and engineering properties of soil and compare for different proportions of soil and C&D Waste. For finding properties of soil and C&D Waste, various test is carried out like sieve analysis, hydrometer test, specific gravity test, Atterberg’s limit test, Standard proctor test and soil Triaxial unconsolidated undrained test. It also takes into account the characteristics alteration due to addition of C&D Waste in active and passive pressure. This study presents the efficacy for use of C&D Waste as a stabilizing material to be mixed with backfill soil in retaining walls. Standard proctor test was conducted at proportions S1W0 (soil = 100%, Waste = 0%), S7W1 (soil = 87.5%, waste = 12.5%), S3W1, S5W3 and S1W1. From these, S5W3 showed optimum results, so this proportion was considered for Soil Triaxial UU-Test. Also, S1W0 was considered too. When 37.5% of soil is replaced by C&D Waste, the Optimum moisture content (OMC) decrease by 11.48%, further, increase C&D Waste in soil OMC remains constant, and maximum dry density (MDD) were observed to be increased by 9.27%, further increased C&D Waste in soil MDD reduces. Carried out strength test, which shows cohesion decreased by 162% and the internal friction angle increased by 49.4% with compare to virgin soil. The study focuses on the potential use of C&D Waste as a stabilizing material in the retaining wall backfill. The active earth pressure decreases, and the passive earth pressure increases in the S5W3 mixture compared to the S1W0 mixture at the same depth.Keywords: black cotton soil, construction demolition waste, compaction test, strength test
Procedia PDF Downloads 8410894 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol
Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang
Abstract:
NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism
Procedia PDF Downloads 45210893 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 50510892 The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion
Authors: Yuval Reinfeld
Abstract:
This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks.Keywords: digital privacy, cybersecurity, GDPR, European Union Law, artificial intelligence, global normative power
Procedia PDF Downloads 2710891 Thermal Vacuum Chamber Test Result for CubeSat Transmitter
Authors: Fitri D. Jaswar, Tharek A. Rahman, Yasser A. Ahmad
Abstract:
CubeSat in low earth orbit (LEO) mainly uses ultra high frequency (UHF) transmitter with fixed radio frequency (RF) output power to download the telemetry and the payload data. The transmitter consumes large amount of electrical energy during the transmission considering the limited satellite size of a CubeSat. A transmitter with power control ability is designed to achieve optimize the signal to noise ratio (SNR) and efficient power consumption. In this paper, the thermal vacuum chamber (TVAC) test is performed to validate the performance of the UHF band transmitter with power control capability. The TVAC is used to simulate the satellite condition in the outer space environment. The TVAC test was conducted at the Laboratory of Spacecraft Environment Interaction Engineering, Kyushu Institute of Technology, Japan. The TVAC test used 4 thermal cycles starting from +60°C to -20°C for the temperature setting. The pressure condition inside chamber was less than 10-5Pa. During the test, the UHF transmitter is integrated in a CubeSat configuration with other CubeSat subsystem such as on board computer (OBC), power module, and satellite structure. The system is validated and verified through its performance in terms of its frequency stability and the RF output power. The UHF band transmitter output power is tested from 0.5W to 2W according the satellite mode of operations and the satellite power limitations. The frequency stability is measured and the performance obtained is less than 2 ppm in the tested operating temperature range. The test demonstrates the RF output power is adjustable in a thermal vacuum condition.Keywords: communication system, CubeSat, SNR, UHF transmitter
Procedia PDF Downloads 26510890 A Methodology of Testing Beam to Column Connection under Lateral Impact Load
Authors: A. Al-Rifaie, Z. W. Guan, S. W. Jones
Abstract:
Beam to column connection can be considered as the most important structural part that affects the response of buildings to progressive collapse. However, many studies were conducted to investigate the beam to column connection under accidental loads such as fire, blast and impact load to investigate the connection response. The study is a part of a PhD plan to investigate different types of connections under lateral impact load. The conventional test setups, such as cruciform setup, were designed to apply shear forces and bending moment on the connection, whilst, in the lateral impact case, the connection is subjected to combined tension and moment. Hence, a review is presented to introduce the previous test setup that is used to investigate the connection behaviour. Then, the design and fabrication of the novel test setup is presented. Finally, some trial test results to investigate the efficiency of the proposed setup are discussed. The final results indicate that the setup was efficient in terms of the simplicity and strength.Keywords: connections, impact load, drop hammer, testing methods
Procedia PDF Downloads 30010889 Utilization of the Compendium on Contextualized Story Word Problems in Mathematics
Authors: Rex C. Apillanes, Ana Rubi L. Sereño, Ellen Joy L. Palangan
Abstract:
The main objective of this action research is to know the effectiveness of the compendium on Contextualized Story Word Problem in Mathematics used as an intervention material to enhance the comprehension and problem-solving skills of Grade 4 pupils. This also addresses the competencies outlined in the curriculum guide while, at the same time, providing instructional material which the pupils can work on and practice solving word problems. The twelve randomly selected grade four pupils of Mantuyom Elementary School have been chosen as respondents for this action research in consideration of their consent and approval. A Pre-Test and a Post-test have been given to the pupils to determine their baseline proficiency level in four fundamental operations. The data has been statistically treated using a T-test to determine their difference. At a mean score of 13.42 and 16.83 for pre and post-tests, respectively, the p-value of 0.000620816 reflects a highly significant difference for the pre-test and post-test. This is lesser than the 0.05 level of significance (p≤0.05). Therefore, it is found that the compendium of contextualized story word problems is an efficient instructional material for Mathematics 4, yet; it is recommended that a Parents’ User Guide shall be developed to assist the parents in the conduct of the Remediation, Reinforcement and Enhancement (RRE).Keywords: action research, compendium, contextualized, story, word problem, research, intervention
Procedia PDF Downloads 10210888 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia
Authors: Rina Arum Prastyanti
Abstract:
Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.Keywords: mobile commerce, legal protection, consumer, effectiveness
Procedia PDF Downloads 36510887 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand
Authors: Rahil Saeedi
Abstract:
The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking
Procedia PDF Downloads 16810886 A User Identification Technique to Access Big Data Using Cloud Services
Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy
Abstract:
Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.Keywords: design, implementation algorithms, performance, biometric approach
Procedia PDF Downloads 47710885 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy
Authors: F. Pagliara, F. Mauriello
Abstract:
The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.Keywords: tourists, overnights, high speed rail, attractions, security
Procedia PDF Downloads 15810884 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 42310883 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon
Authors: Forbah Julius Ajamah
Abstract:
The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.Keywords: justice, security, human rights abuses, conflicts, crisis
Procedia PDF Downloads 8710882 Enhanced Physiological Response of Blood Pressure and Improved Performance in Successive Divided Attention Test Seen with Classical Instrumental Background Music Compared to Controls
Authors: Shantala Herlekar
Abstract:
Introduction: Entrainment effect of music on cardiovascular parameters is well established. Music is being used in the background by medical students while studying. However, does it really help them relax faster and concentrate better? Objectives: This study was done to compare the effects of classical instrumental background music versus no music on blood pressure response over time and on successively performed divided attention test in Indian and Malaysian 1st-year medical students. Method: 60 Indian and 60 Malaysian first year medical students, with an equal number of girls and boys were randomized into two groups i.e music group and control group thus creating four subgroups. Three different forms of Symbol Digit Modality Test (to test concentration ability) were used as a pre-test, during music/control session and post-test. It was assessed using total, correct and error score. Simultaneously, multiple Blood Pressure recordings were taken as pre-test, during 1, 5, 15, 25 minutes during music/control (+SDMT) and post-test. The music group performed the test with classical instrumental background music while the control group performed it in silence. Results were analyzed using students paired t test. p value < 0.05 was taken as statistically significant. A drop in BP recording was indicative of relaxed state and a rise in BP with task performance was indicative of increased arousal. Results: In Symbol Digit Modality Test (SDMT) test, Music group showed significant better results for correct (p = 0.02) and total (p = 0.029) scores during post-test while errors reduced (p = 0.002). Indian music group showed decline in post-test error scores (p = 0.002). Malaysian music group performed significantly better in all categories. Blood pressure response was similar in music and control group with following variations, a drop in BP at 5minutes, being significant in music group (p < 0.001), a steep rise in values till 15minutes (corresponding to SDMT test) also being significant only in music group (p < 0.001) and the Systolic BP readings in controls during post-test were at lower levels compared to music group. On comparing the subgroups, not much difference was noticed in recordings of Indian student’s subgroups while all the paired-t test values in the Malaysian music group were significant. Conclusion: These recordings indicate an increased relaxed state with classical instrumental music and an increased arousal while performing a concentration task. Music used in our study was beneficial to students irrespective of their nationality and preference of music type. It can act as an “active coping” strategy and alleviate stress within a very short period of time, in our study within a span of 5minutes. When used in the background, during task performance, can increase arousal which helps the students perform better. Implications: Music can be used between lectures for a short time to relax the students and help them concentrate better for the subsequent classes, especially for late afternoon sessions.Keywords: blood pressure, classical instrumental background music, ethnicity, symbol digit modality test
Procedia PDF Downloads 14310881 Modalmetric Fiber Sensor and Its Applications
Authors: M. Zyczkowski, P. Markowski, M. Karol
Abstract:
The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing
Procedia PDF Downloads 62110880 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 47510879 Determining Factors for Opening Accounts, Customers’ Perception and Their Satisfaction Level Towards the First Security Islamic Bank of Bangladesh
Authors: Md. Akiz Uddin
Abstract:
This research attempted to identify the determining factors that extensively persuaded customers of the First Security Islamic Bank Limited (FSIBL) to open accounts and their perception and satisfaction level towards it. Initially, a theoretical model was established based on existing literature reviews. After that, a self-administered structured questionnaire was developed, and data were collected from 180 customers of the FSIBL of Bangladesh using purposive sampling technique. The collected data were later analyzed through a statistical software. Structural Equation Modelling (SEM) was used to verify the model of the study and test the hypotheses. The study particularly examined the determinants of opening accounts, customers’ perception and their satisfaction level towards the bank on several factors like the bank’s compliance with Shariah law, use of modern technology, assurance, reliability, empathy, profitability, and responsiveness. To examine the impact of religious belief on being FSIBL clients, the study also investigates non-Muslim clients’ perception about FSIBL. The study focused on FSIBL customers only from five branches of Dhaka city. The study found that the religious beliefs is the most significant factors for Muslim customers for considering FSIBL to open an account, and they are satisfied with the services, too. However, for non-Muslim customers, other benefits like E-banking, various user-friendly services are the most significant factors for choosing FSIBL. Their satisfaction level is also statistically significant. Furthermore, even if the non- Muslim customers didn’t consider religious beliefs as determinant factors for choosing FSIBL, the respondents informed that they have trust that people who believe in shariah law are more reliable to keep money with them. These findings open up the avenue for future researchers to conduct more study in this area through employing a larger sample size and more branches and extending the current model by incorporating new variables. The study will be an important addition to the potentials of Islamic banking system, literature of service quality and customer satisfaction level, particularly in the success of Islamic banking system in Bangladesh.Keywords: islamic banking, customers’ satisfaction, customers’ perception, shariah law
Procedia PDF Downloads 7610878 A Study on the Non-Destructive Test Characterization of Carbon Fiber Reinforced Plastics Using Thermo-Graphic Camera
Authors: Hee Jae Shin, In Pyo Cha, Min Sang Lee, Hyun Kyung Yoon, Tae Ho Kim, Yoon Sun Lee, Lee Ku Kwac, Hong Gun Kim
Abstract:
Non-destructive testing and evaluation techniques for assessing the integrity of composite structures are essential to both reduce manufacturing costs and out of service time of transport means due to maintenance. In this study, Analyze into non-destructive test characterization of carbon fiber reinforced plastics(CFRP) internal and external defects using thermo-graphic camera and transient thermography method. non-destructive testing were characterized by defect size(∅8,∅10,∅12,∅14) and depth(1.2mm,2.4mm).Keywords: Non-Destructive Test (NDT), thermal characteristic, thermographic camera, Carbon Fiber Reinforced Plastics(CFRP).
Procedia PDF Downloads 536