Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5326

Search results for: cyber security awareness

4186 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges

Authors: Murtala Gada Abubakar, Aliyu T. Umar

Abstract:

A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.

Keywords: basement complex, hydrological processes, Sokoto Basin, water security

Procedia PDF Downloads 305
4185 High School Students’ Seismic Risk Perception and Preparedness in Shavar, Dhaka

Authors: Mohammad Lutfur Rahman

Abstract:

School students of Dhaka are in extreme risk of natural disasters. However, the study on assessment of the real scenario of high school students about perceptions of earthquake is very little. The purpose of this cross-sectional study is to assess the seismic risk perception and preparedness levels about earthquake among high school students in Shavar, Dhaka. A questionnaire was developed, and data collection was done about a group of high school students in seven classrooms. The author uses a method of surveying high school students to identify and describe the factors that influence their knowledge and perceptions about earthquake. This study examines gender and grade differences in perceived risk and communication behavior in response to the earthquake. Female students’ preparation, participation, and communication with family are more frequent than that of male students. Female students have been found to be more likely to learn about a disaster than male students. Higher grade students have more awareness but less preparedness about earthquake than that of the younger one. This research concludes that irrespective of grades, high school students are vulnerable to earthquake due to the lack of a seismic education program.

Keywords: awareness, earthquake, risk perception, seismic

Procedia PDF Downloads 227
4184 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 132
4183 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 87
4182 Factors Associated with the Acceptance and Rejection of Rural Livestock Insurance in Garmsar: Semnan Province

Authors: Ali Ashraf Hamedi Oghul Beyk

Abstract:

The main objective of the study is to determine the factors which influence the acceptance or rejection of rural livestock insurance in Garmsar. The research method is descriptive one. There are two groups of research populations: 1467 cases in acceptance group and 7000 cases in rejection group. The sample population is 320 cases among 8467 ones. Data collection instrument is questionnaire. The validity of the questionnaire was measured by faculty members and other agriculture experts and also reliability of it determined through Cronbach alpha which was %83. Correlation between acceptance and rejection of investigated population. According to the findings of the research, between educational level, basic income from farm-related communication channels, contacts of experts and acceptance and rejection of livestock insurance at %5 & the mortality rate, loan awareness of the objectives of the livestock insurance benefits %1 there is a meaningful relationship. Mann-Whitney test shows the different educational levels, different awareness and interest to livestock insurance between the two groups. Besides, the T-test shows the livestock losses rate in two groups.

Keywords: insurance, livestock, Garmsar, Semnan

Procedia PDF Downloads 336
4181 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens

Authors: Michelle D. Hand, Michelle L. Kaiser

Abstract:

African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.

Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu

Procedia PDF Downloads 257
4180 Study of Reporting System for Adverse Events Related to Common Medical Devices at a Tertiary Care Public Sector Hospital in India

Authors: S. Kurian, S. Satpathy, S. K. Gupta, S. Arya, D. K. Sharma

Abstract:

Advances in the use of health care technology have resulted in increased adverse events (AEs) related to the use of medical devices. The study focused on the existing reporting systems. This study was conducted in a tertiary care public sector hospital. Devices included Syringe infusion pumps, Cardiac monitors, Pulse oximeters, Ventilators and Defibrillators. A total of 211 respondents were recruited. Interviews were held with 30 key informants. Medical records were scrutinized. Relevant statistical tests were used. Resident doctors reported maximum frequency of AEs, followed by nurses; and least by consultants. A significant association was found between the cadre of health care personnel and awareness that the patients and bystanders have a risk of sustaining AE. Awareness regarding reporting of AEs was low, and it was generally done verbally. Other critical findings are discussed in the light of the barriers to reporting, reasons for non-compliance, recording system, and so on.

Keywords: adverse events, health care technology, medical devices, public sector hospital, reporting systems

Procedia PDF Downloads 324
4179 Barriers to Job Localization Policy in Private Sector: Case Study from Oman

Authors: Yahya Al Nahdi

Abstract:

Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.

Keywords: localization, job security, labour force structure, Omanization, private sector, public sector

Procedia PDF Downloads 381
4178 Post Covid-19 Scenario and Contemporary International Security Challenges

Authors: Rubina Waseem

Abstract:

The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.

Keywords: covid-19, global challenges, international politics, international security

Procedia PDF Downloads 152
4177 Assessing Role of Newspapers in Creating Awareness of HIV/AIDS in Pakistan

Authors: Fatima Kiran

Abstract:

This study investigates the HIV/AIDS coverage in the selected newspapers. The premises of the study depend upon the fact that informing public about any social issue that effects people’s life is among one of the fundamental functions of media, such as HIV/AIDS is one of prime importance. In this study two most prime newspapers of Pakistan Daily Jang and Daily Dawn were analyzed. This paper adopted two approaches for investigation one is content analysis and another is discourse analysis. The content analysis was used to determine the frequency of HIV/AIDS content coverage. Discourse analysis was used to determine consciousness of these newspapers on covering HIV/AIDS stories with correct language and terminologies according to the given media guideline of UNICEF. Total 368 editions from 1st July 2017 to 31st December 2017 were sampled for the study. The result of the study indicates that newspapers have severely underestimated the severity of HIV/AIDS. The coverage given by newspapers is dissatisfactory. Selected newspapers used inappropriate terminologies and language in the stories which shows negligence of newspapers regarding HIV/AIDS issue.

Keywords: Pakistani newspapers, HIV/AIDS, coverage, public awareness, content analysis, discourse analysis, press consciousness

Procedia PDF Downloads 119
4176 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 325
4175 A User Interface for Easiest Way Image Encryption with Chaos

Authors: D. López-Mancilla, J. M. Roblero-Villa

Abstract:

Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.

Keywords: image encryption, chaos, secure communications, user interface

Procedia PDF Downloads 471
4174 The Awareness of Sustainability Concerns in Design Studio Education Process: A Case from TOBB ETU University, Interior Architecture Department in Turkey

Authors: Pelin Atav, Gözen Güner Aktaş, Nur Ayalp

Abstract:

Today’s world has started to develop design process within an interdisciplinary working environment. There is an aim of creating the most permanent design for the future. While satisfying people’s needs, environment and people relationships should be considered. When this relationship was considered for the future, the sustainability term comes to mind. The term Sustainability has been adapted very well by designer and architects. It is also one of the main and significant parts of the design process. As the education process cultivates the future professionals, the awareness of those concepts in the education process has a vital importance. The question is stated as thus: Are the 3rd and 4th year design studio students, familiar and sensitive to the concept of sustainability in the TOBB ETU University Interior Design Studio. Design studios and the instructors should be taken into consideration while this sustainability term is taught. The term "Sustainability" can not be learned without making any application in the actual real world. While students make this study, They can have the chance to search the topic of sustainability step by step. Due to having various extent, sustainability term becomes quite a comprehensive issue. In order not to create negative consequences, designers and architects work by adapting this term. In terms of material, construction process, lighting, building service, furniture, systems that are used, energy consumption issues that are considered and creating positive drawbacks for the future are aimed. This research is aimed at how university education shapes designer’s works in terms of sustainability. By giving a project that is a main interest in the field of sustainability, students are expected to reach well-thought-of results and analysis. Project process were conducted with instructor and student studies together. According to critics from their instructors, students try to product well- designed results. TOBB University was choosen as a research area situated in Ankara in Turkey. Third and fourth class (interior designer/architect department) students who are from the Faculty of Fine Arts Design and Architecture are the subject group selected for this study. Aim of this study is demonstrating sustainability as a term having application in design studio. Thus, awareness of sustainability terms will be evaluated and its development process in the university education will be observed. Consequently, results that are expected is how sustainability term is conducted in project and for the sustainability term awareness in design studios and their projects have been sufficient or not.

Keywords: design education, design process, interior design studios, sustainability

Procedia PDF Downloads 269
4173 Smuggling of Migrants as an Influential Factor on National Security, Economic and Social Life

Authors: Jordan Georgiev Deliversky

Abstract:

Human trafficking and smuggling of migrants are criminal activities, which are on the rise over recent years. The number of legal migrants arrived in Europe from outside the European Union are far less than those who want to come and settle in Europe. The objective of this paper is to present the impact on economic and social life of significant measures influencing the smuggling of migrants. The analysis is focused on various complex factors which have multiple origins and are highly influential as regard to the process of migration and the smuggling of migrants. The smuggling of migrants is a criminal activity, directly related to migration. The main results show that often the routes chosen for smuggling of migrants are circuitous, as smugglers carefully avoid strictly controlled roads, checkpoints, and countries or jurisdictions where there is efficiency of justice, with particular emphasis on the law on trafficking of persons and smuggling of migrants.

Keywords: corruption, migration, security, smuggling

Procedia PDF Downloads 247
4172 Challenges of Implementing Participatory Irrigation Management for Food Security in Semi Arid Areas of Tanzania

Authors: Pilly Joseph Kagosi

Abstract:

The study aims at assessing challenges observed during the implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation, and literature review. Data collected from the questionnaire was analysed using SPSS while PRA data was analysed with the help of local communities during PRA exercise. Data from other methods were analysed using content analysis. The study revealed that PIM approach has a contribution in improved food security at household level due to the involvement of communities in water management activities and decision making which enhanced the availability of water for irrigation and increased crop production. However, there were challenges observed during the implementation of the approach including; minimum participation of beneficiaries in decision-making during planning and designing stages, meaning inadequate devolution of power among scheme owners. Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However, it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.

Keywords: challenges, participatory approach, irrigation management, food security, semi arid areas

Procedia PDF Downloads 313
4171 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 341
4170 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 136
4169 Resilient Regions for Purpose of Crisis Management

Authors: Jana Gebhartova, Tomas Duda, Ivan Benes

Abstract:

World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.

Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies

Procedia PDF Downloads 364
4168 Awareness of Genetically Modified Products Among Malaysian Consumers

Authors: Muhamad Afiq Faisal, Yahaya, Mohd Faizal, Hamzah

Abstract:

Genetic modification technology allows scientists to alter the genetic information of a particular organism. The technology allows the production of genetically modified organism (GMO) that has the enhanced property compared to the unmodified organism. The application of such technology is not only in agriculture industry, it is now has been applied extensively in biopharmaceutical industry such as transgenic vaccines. In Malaysia, Biosafety Act 2007 has been enacted in which all GMO-based products must be labeled with adequate information before being marketed. This paper aims to determine the awareness level amongst Malaysian consumers on the GM products available in the market and the efficiency of information supplied in the GM product labeling. The result of the survey will serve as a guideline for Malaysia government agency bodies to provide comprehensive yet efficient information to consumers for the purpose of GM product labeling in the near future. In conclusion, the efficiency of information delivery plays a vital role in ensuring that the information is being conveyed clearly to Malaysian consumers during the selection process of GM products available in the market.

Keywords: genetic modification technology, genetically modified organisms, genetically modified organism products labeling, Biosafety Act 2007

Procedia PDF Downloads 342
4167 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 62
4166 Signed Language Phonological Awareness: Building Deaf Children's Vocabulary in Signed and Written Language

Authors: Lynn Mcquarrie, Charlotte Enns

Abstract:

The goal of this project was to develop a visually-based, signed language phonological awareness training program and to pilot the intervention with signing deaf children (ages 6 -10 years/ grades 1 - 4) who were beginning readers to assess the effects of systematic explicit American Sign Language (ASL) phonological instruction on both ASL vocabulary and English print vocabulary learning. Growing evidence that signing learners utilize visually-based signed language phonological knowledge (homologous to the sound-based phonological level of spoken language processing) when reading underscore the critical need for further research on the innovation of reading instructional practices for visual language learners. Multiple single-case studies using a multiple probe design across content (i.e., sign and print targets incorporating specific ASL phonological parameters – handshapes) was implemented to examine if a functional relationship existed between instruction and acquisition of these skills. The results indicated that for all cases, representing a variety of language abilities, the visually-based phonological teaching approach was exceptionally powerful in helping children to build their sign and print vocabularies. Although intervention/teaching studies have been essential in testing hypotheses about spoken language phonological processes supporting non-deaf children’s reading development, there are no parallel intervention/teaching studies exploring hypotheses about signed language phonological processes in supporting deaf children’s reading development. This study begins to provide the needed evidence to pursue innovative teaching strategies that incorporate the strengths of visual learners.

Keywords: American sign language phonological awareness, dual language strategies, vocabulary learning, word reading

Procedia PDF Downloads 318
4165 Domains of Socialization Interview: Development and Psychometric Properties

Authors: Dilek Saritas Atalar, Cansu Alsancak Akbulut, İrem Metin Orta, Feyza Yön, Zeynep Yenen, Joan Grusec

Abstract:

Objective: The aim of this study was to develop semi-structured Domains of Socialization Interview and its coding manual and to test their psychometric properties. Domains of Socialization Interview was designed to assess maternal awareness regarding effective parenting in five socialization domains (protection, mutual reciprocity, control, guided learning, and group participation) within the framework of the domains-of-socialization approach. Method: A series of two studies were conducted to develop and validate the interview and its coding manual. The pilot study, sampled 13 mothers of preschool-aged children, was conducted to develop the assessment tools and to test their function and clarity. Participants of the main study were 82 Turkish mothers (Xage = 34.25, SD = 3.53) who have children aged between 35-76 months (Xage = 50.75, SD = 11.24). Mothers filled in a questionnaire package including Coping with Children’s Negative Emotions Questionnaire, Social Competence and Behavior Evaluation-30, Child Rearing Questionnaire, and Two Dimensional Social Desirability Questionnaire. Afterward, interviews were conducted online by a single interviewer. Interviews were rated independently by two graduate students based on the coding manual. Results: The relationships of the awareness of effective parenting scores to the other measures demonstrate convergent, discriminant, and predictive validity of the coding manual. Intra-class correlation coefficient estimates were ranged between 0.82 and 0.90, showing high interrater reliability of the coding manual. Conclusion: Taken as a whole, the results of these studies demonstrate the validity and reliability of a new and useful interview to measure maternal awareness regarding effective parenting within the framework of the domains-of-socialization approach.

Keywords: domains of socialization, parenting, interview, assessment

Procedia PDF Downloads 169
4164 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 205
4163 Biochar and Food Security in Central Uganda

Authors: Nataliya Apanovich, Mark Wright

Abstract:

Uganda is among the poorest but fastest growing populations in the world. Its annual population growth of 3% puts additional stress through land fragmentation, agricultural intensification, and deforestation on already highly weathered tropical (Ferralsol) soils. All of these factors lead to decreased agricultural yields and consequently diminished food security. The central region of Uganda, Buganda Kingdom, is especially vulnerable in terms of food security as its high population density coupled with mismanagement of natural resources led to gradual loss of its soil and even changes in microclimate. These changes are negatively affecting livelihoods of smallholder farmers who comprise 80% of all population in Uganda. This research focuses on biochar for soil remediation in Masaka District, Uganda. If produced on a small scale from locally sourced materials, biochar can increase the quality of soil in a cost and time effective manner. To assess biochar potential, 151 smallholder farmers were interviewed on the types of crops grown, agricultural residues produced and their use, as well as on attitudes towards biochar use and its production on a small scale. The interviews were conducted in 7 sub-counties, 32 parishes, and 92 villages. The total farmland covered by the study was 606.2 kilometers. Additional information on the state of agricultural development and environmental degradation in the district was solicited from four local government officials via informal interviews. This project has been conducted in collaboration with the international agricultural research institution, Makerere University in Kampala, Uganda. The results of this research can have implications on the way farmers perceive the value of their agricultural residues and what they decide to do with them. The underlying objective is to help smallholders in degraded soils increase their agricultural yields through the use of biochar without diverting the already established uses of agricultural residues to a new soil management practice.

Keywords: agricultural residues, biochar, central Uganda, food security, soil erosion, soil remediation

Procedia PDF Downloads 266
4162 Integrating Multi-Sectoral Approaches to Address Gender-Based Violence in Lagos State: Prevalence, Perceptions, and Policy Recommendations

Authors: Lola Vivour-Adeniyi, Oluwatoyosi Abikoye

Abstract:

Gender-based violence (GBV) is a pervasive issue that demands a nuanced understanding to foster effective solutions. This study, conducted by the Lagos State Domestic and Sexual Violence Agency (DSVA), delves into the heart of Lagos State to uncover the realities of GBV, from the perceptions of its residents to the efficacy of support systems in place. Covering ten local government areas (LGAs) and drawing from a diverse range of demographics—gender, age, marital status, literacy levels, religion, and ethnicity—this research paints a comprehensive picture of GBV's impact. The narrative begins with the voices of the community, revealing a widespread awareness of GBV's multifaceted nature—physical, emotional, psychological, and structural. Through their stories, key drivers such as poverty, low education levels, and substance abuse emerge, illustrating the interconnected factors that sustain GBV. Despite a high level of awareness, there is a significant gap in knowledge about reporting mechanisms, highlighting an urgent need for improved accessibility and information dissemination on support services. Notably, inter-agency collaboration and public awareness campaigns play crucial roles in the community's fight against GBV. This study evaluates these efforts by the Lagos State Government, shedding light on successful educational interventions that have transformed community attitudes. Case studies of these initiatives provide examples of success, demonstrating the power of coordinated action and informed advocacy. In conclusion, the study calls for a robust, multi-sectoral approach—engaging government agencies, civil society organizations, and community stakeholders—to address GBV comprehensively. Recommendations include scaling successful models to other urban centers, enhancing reporting mechanisms for greater accessibility and confidentiality, and investing in ongoing research to refine our understanding of GBV's dynamics with the aim to foster a safer and more inclusive society, tackling the root causes of GBV and improving support for survivors.

Keywords: gender based violence, policy recommendations, public awareness, Iinter agency collaboration

Procedia PDF Downloads 11
4161 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.

Keywords: discrete wavelet transforms, AES, dynamic SBox

Procedia PDF Downloads 419
4160 Efficiency of Using E-Wallets as Payment Method in Marikina City During COVID-19 Pandemic

Authors: Noel Paolo Domingo, James Paul Menina, Laurente Ferrer

Abstract:

Most people were forced to stay at home and limit their physical contact during the COVID-19 pandemic. Due to the situation, strict implementation of government policies and safety protocols encouraged consumers to utilize cashless or digital transactions through e-wallets. In this study, the researchers aim to investigate the efficiency of using e-wallets as a payment method during the COVID-19 pandemic in Marikina City. The study examined the efficiency of e-wallets in terms of Usefulness, Convenience, and Safety and Security based on respondents’ assessment. Questionnaires developed by the researchers were distributed to a total of 400 e-wallet users in Marikina City aged 15 years old and above to gather data by using a purposive sampling technique. The data collected was processed using SPSS version 26. Frequency, percentage, and mean were utilized to describe the profile of respondents and their assessment of e-wallets in terms of the three constructs. ANOVA and t-tests were also employed to test the significant differences in the respondent’s assessment when the demographic profile was considered. The study revealed that when it comes to usefulness, e-wallet is efficient while in terms of convenience, and safety and security, e-wallet has been proven to be very efficient. During the COVID-19 pandemic, utilizing e-wallets has been embraced by most consumers. By enhancing its features, more people will be satisfied with using e-wallets.

Keywords: efficiency of e-wallets, usefulness, convenience, safety and security

Procedia PDF Downloads 112
4159 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 501
4158 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 113
4157 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria

Authors: Babatunde Oluwamayokun Soyoye

Abstract:

This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.

Keywords: design and fabrication, food security, grain crop, motorized planter

Procedia PDF Downloads 119