Search results for: communication system security
21171 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 43321170 Deconstructing Local Area Networks Using MaatPeace
Authors: Gerald Todd
Abstract:
Recent advances in random epistemologies and ubiquitous theory have paved the way for web services. Given the current status of linear-time communication, cyberinformaticians compellingly desire the exploration of link-level acknowledgements. In order to realize this purpose, we concentrate our efforts on disconfirming that DHTs and model checking are mostly incompatible.Keywords: LAN, cyberinformatics, model checking, communication
Procedia PDF Downloads 40121169 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.Keywords: asymmetrical warfare, conventional forces, security, terrorism
Procedia PDF Downloads 26221168 Optimizing the Public Policy Information System under the Environment of E-Government
Authors: Qian Zaijian
Abstract:
E-government is one of the hot issues in the current academic research of public policy and management. As the organic integration of information and communication technology (ICT) and public administration, e-government is one of the most important areas in contemporary information society. Policy information system is a basic subsystem of public policy system, its operation affects the overall effect of the policy process or even exerts a direct impact on the operation of a public policy and its success or failure. The basic principle of its operation is information collection, processing, analysis and release for a specific purpose. The function of E-government for public policy information system lies in the promotion of public access to the policy information resources, information transmission through e-participation, e-consultation in the process of policy analysis and processing of information and electronic services in policy information stored, to promote the optimization of policy information systems. However, due to many factors, the function of e-government to promote policy information system optimization has its practical limits. In the building of E-government in our country, we should take such path as adhering to the principle of freedom of information, eliminating the information divide (gap), expanding e-consultation, breaking down information silos and other major path, so as to promote the optimization of public policy information systems.Keywords: China, e-consultation, e-democracy, e-government, e-participation, ICTs, public policy information systems
Procedia PDF Downloads 86521167 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency
Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo
Abstract:
Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods
Procedia PDF Downloads 14921166 Equivalent Circuit Representation of Lossless and Lossy Power Transmission Systems Including Discrete Sampler
Authors: Yuichi Kida, Takuro Kida
Abstract:
In a new smart society supported by the recent development of 5G and 6G Communication systems, the im- portance of wireless power transmission is increasing. These systems contain discrete sampling systems in the middle of the transmission path and equivalent circuit representation of lossless or lossy power transmission through these systems is an important issue in circuit theory. In this paper, for the given weight function, we show that a lossless power transmission system with the given weight is expressed by an equivalent circuit representation of the Kida’s optimal signal prediction system followed by a reactance multi-port circuit behind it. Further, it is shown that, when the system is lossy, the system has an equivalent circuit in the form of connecting a multi-port positive-real circuit behind the Kida’s optimal signal prediction system. Also, for the convenience of the reader, in this paper, the equivalent circuit expression of the reactance multi-port circuit and the positive- real multi-port circuit by Cauer and Ohno, whose information is currently being lost even in the world of the Internet.Keywords: signal prediction, pseudo inverse matrix, artificial intelligence, power transmission
Procedia PDF Downloads 12221165 Interethnic Communication in Multicultural Areas: A Case Study of Intercultural Sensitivity Between Baloch and Persians in Iran
Authors: Mehraveh Taghizadeh
Abstract:
Iran is home to a diverse range of ethnic groups such as Baloch, Kurds, Persians, Lors, Arabs, and Turks. The Persian ethnicity is the largest group, while Baloch people are considered a minority residing on the southeastern border of the country with different language and religion. As a consequence, Political discussions have often prioritized national identity and national security over Baloch ethnic identity. However, to improve intercultural understanding and reduce cultural schemas, it's crucial to decrease ethnocentrism and increase intercultural communication. In the meantime, Kerman, a multicultural province that borders Sistan and Baluchistan, has become a destination for Baloch immigrants. By recognizing the current status of intercultural competence, we can develop effective policies for expanding intercultural communication and creating a more inclusive and peaceful society. As a result, this research aims to study the domain of intercultural sensitivity between Persians and Baloch in Kerman. Therefore, the question is how do Persians and Baloch ethnicities perceive each other? This study represents the first exploration of communication dynamics between Persians and Baloch individuals. Utilizing a qualitative approach, this study employs thematic analysis in conjunction with Bennett's intercultural sensitivities model. The model comprises two components: ethnocentrism, which spans from denial and defense to minimization, and ethno-relativism, which ranges from acceptance and adaptation to integration. To attain this objective, 30 individuals from Persian and Baloch ethnicities were interviewed using a semi-structured format. it analysis suggests that the Baluch and Persians exhibit a range of intercultural sensitivities characterized by defensive and minimizing attitudes in the ethnocentrism domain, and accepting attitudes in the ethno-relativism domain. The concept of minimization involves recognizing the shared humanity and positive schemas of both groups. Furthermore, in the adaptation domain, Persians' efforts to assimilate into Baloch culture at an acceptance level are primarily focused on the civilizational dimension, including using traditional Balochi clothing designs on their clothes. The Persians hold intercultural schemas about the Baloch people, including notions of religious fanaticism, tribalism, poverty, smuggling, and a nomadic way of life. Conversely, the Baloch people have intercultural schemas about Persians including religious fanaticism, disdain towards the Baloch, and ethnocentrism. Both groups tend to tie ethnicity to religion and judge each other accordingly. Also, the origin of these schemas is in the representation of the media and the encounter without interaction between the two ethnic groups. These findings indicate that they have not received adaptation and integration levels in ethno-relativism. Furthermore, the results indicate that developing personal communication in multicultural environments reduces intercultural sensitivity, and increases positive interactions and civilizational dialogues. People can understand each other better and perform better in their daily lives.Keywords: intercultural communication, intercultural sensitivity, interethnic communication, Iran, Baloch, Persians
Procedia PDF Downloads 5121164 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources
Authors: M. R. Ebrahimi, B. Mahdaviani
Abstract:
Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system
Procedia PDF Downloads 60821163 Understanding the Effect of Fall Armyworm and Integrated Pest Management Practices on the Farm Productivity and Food Security in Malawi
Authors: Innocent Pangapanga, Eric Mungatana
Abstract:
Fall armyworm (FAW) (Spodoptera frugiperda), an invasive lepidopteran pest, has caused substantial yield loss since its first detection in September 2016, thereby threatening the farm productivity food security and poverty reduction initiatives in Malawi. Several stakeholders, including households, have adopted chemical pesticides to control FAW without accounting for its costs on welfare, health and the environment. Thus, this study has used panel data endogenous switching regression model to investigate the impact of FAW and the integrated pest management (IPM) –related practices on-farm productivity and food security. The study finds that FAW substantively reduces farm productivity by seven (7) percent and influences the adoption of IPM –related practices, namely, intercropping, mulching, and agroforestry, by 6 percent, ceteris paribus. Interestingly, multiple adoptions of the IPM -related practices noticeably increase farm productivity by 21 percent. After accounting for potential endogeneity through the endogenous switching regression model, the IPM practices further demonstrate tenfold more improvement on food security, implying the role of the IPM –related practices in containing the effect of FAW at the household level.Keywords: hunger, invasive fall army worms, integrated pest management practices, farm productivity, endogenous switching regression
Procedia PDF Downloads 13821162 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security
Authors: Lynndee Kemmet
Abstract:
The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.Keywords: food security, food system model, political stability, US Military
Procedia PDF Downloads 19521161 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism
Authors: Adamu Buba
Abstract:
As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.Keywords: challenges, security, governance, ecowas, response
Procedia PDF Downloads 25621160 Development of an Automatic Monitoring System Based on the Open Architecture Concept
Authors: Andrii Biloshchytskyi, Serik Omirbayev, Alexandr Neftissov, Sapar Toxanov, Svitlana Biloshchytska, Adil Faizullin
Abstract:
Kazakhstan has adopted a carbon neutrality strategy until 2060. In accordance with this strategy, it is necessary to introduce various tools to maintain the environmental safety of the environment. The use of IoT, in combination with the characteristics and requirements of Kazakhstan's environmental legislation, makes it possible to develop a modern environmental monitoring system. The article proposes a solution for developing an example of an automated system for the continuous collection of data on the concentration of pollutants in the atmosphere based on an open architecture. The Audino-based device acts as a microcontroller. It should be noted that the transmission of measured values is carried out via an open wireless communication protocol. The architecture of the system, which was used to build a prototype based on sensors, an Arduino microcontroller, and a wireless data transmission module, is presented. The selection of elementary components may change depending on the requirements of the system; the introduction of new units is limited by the number of ports. The openness of solutions allows you to change the configuration depending on the conditions. The advantages of the solutions are openness, low cost, versatility and mobility. However, there is no comparison of the working processes of the proposed solution with traditional ones.Keywords: environmental monitoring, greenhouse gases emissions, environmental pollution, Industry 4.0, IoT, microcontroller, automated monitoring system.
Procedia PDF Downloads 4821159 The Impact of Nonverbal Communication Between Restaurant Staff and Customers on Customer Attraction in Restaurants: A Case Study of Food Courts in Tehran City
Authors: Mahshid Asadollahi, Mohammad Akbari Asl
Abstract:
The restaurant industry is highly competitive, and restaurants are constantly looking for ways to attract new customers and retain their existing ones. Nonverbal communication is an important factor in creating a positive customer experience and can play a significant role in attracting customers to restaurants. Nonverbal communication can include body language, facial expressions, tone of voice, and physical proximity, among other things. The present study aimed to investigate the impact of nonverbal communication between restaurant employees and customers on attracting customers in food courts in Tehran. The research method was descriptive-correlational, and the statistical population of this study included all customers of food court restaurants in Tehran, which was about 30 restaurants. The research sample was selected through probability sampling, and 440 customers completed emotional response, customer satisfaction, and nonverbal communication questionnaires in person. The data obtained were analyzed using multiple regression analysis. The results showed that vocal language, employee proximity, physical appearance, and speech movements, as components of nonverbal communication of restaurant employees, had an impact on attracting customers. Additionally, positive and negative emotions of customers have a significant relationship with customer attraction in Food Court restaurants. The study shows that various nonverbal communication factors can play a significant role in attracting customers, and that positive and negative customer emotions can affect customer satisfaction. Therefore, restaurant owners and managers should pay attention to nonverbal communication and train their employees accordingly to create a positive and welcoming atmosphere for customers.Keywords: verbal language, proximity of employees, physical appearance, speech gestures, nonverbal communication, customer emotions, customer attraction
Procedia PDF Downloads 9921158 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution
Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla
Abstract:
The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad
Procedia PDF Downloads 9421157 Research on ARQ Transmission Technique in Mars Detection Telecommunications System
Authors: Zhongfei Cai, Hui He, Changsheng Li
Abstract:
This paper studied in the automatic repeat request (ARQ) transmission technique in Mars detection telecommunications system. An ARQ method applied to proximity-1 space link protocol was proposed by this paper. In order to ensure the efficiency of data reliable transmission, this ARQ method combined these different ARQ maneuvers characteristics. Considering the Mars detection communication environments, this paper analyzed the characteristics of the saturation throughput rate, packet dropping probability, average delay and energy efficiency with different ARQ algorithms. Combined thus results with the theories of ARQ transmission technique, an ARQ transmission project in Mars detection telecommunications system was established. The simulation results showed that this algorithm had excellent saturation throughput rate and energy efficiency with low complexity.Keywords: ARQ, mars, CCSDS, proximity-1, deepspace
Procedia PDF Downloads 34021156 Contribution at Dimensioning of the Energy Dissipation Basin
Authors: M. Aouimeur
Abstract:
The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment
Procedia PDF Downloads 58321155 Assessment of Households' Food Security and Hunger Level across Communities in Ile-Ife, Southwestern Nigeria
Authors: Adebayo-Victoria Tobi Dada, Dada Emmanuel
Abstract:
This study assessed households’ food security and hunger levels among different communities with varying educational and economic background in Ile-Ife, Nigeria, and its environment. It also examined the impacts of varying demography on the household food security level in the area. This was with a view to providing information on the food security status of the subjects within the study area. Ten different communities with varying demography (Parakin, Mokuro, Ilare, Obafemi Awolowo University (OAU) Staff Quarters, Ibadan Road, Aba-Iya Gani, Eleweran, Iraye, Boosa, and Eku-Isobo) were identified within the study area. Fieldwork was then carried out from 7th to 14th of March, 2016 in each of these communities through survey of market prices of food stuff, diet, and nutrition, social well-being, food accessibility and affordability as well as price fluctuation and variation in household’s social background. Selection of households for the survey was done using stratified random sampling method. Key informants included community heads, landlords, tenants, and household heads. Similarly, information on food security levels with respect to demographic backgrounds was obtained from the use of modified Food and Hunger Insecurity Module (FHIM) structured questionnaire. The questionnaire was administered to one percent of the households’ population per community. The results showed that communities such as Parakin and OAU Senior Staff Quarters were dominated by civil servants, while community such as Boosa was dominated by artisans. Respondents earning between ₦11,000 and ₦20,000 per month, during the study period, had the highest percentage across the selected communities. The household food security indices showed that about 41% of the investigated respondents could not guarantee their household food for a month, while 18% reduced or skipped meals. There were positive significant relationships between monthly income (F-value = 132.04), educational status (F-value = 102.30), occupation (F-value = 104.05) and food budget (F-value = 122.09), all at p < 0.05. However, there was no significant relationship between the monthly food budget and household sizes (t-value = -1.4074, p > 0.05). Food secured households’ had the household heads with a higher level of educational attainment. The study concluded that large variations which existed between socio-economic and educational background among the communities had significant effects on households’ food security level in the study area.Keywords: food security, households, hunger level, market prices
Procedia PDF Downloads 21021154 Jordan Water District Interactive Billing and Accounting Information System
Authors: Adrian J. Forca, Simeon J. Cainday III
Abstract:
The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.Keywords: accounting, bill, information system, interactive
Procedia PDF Downloads 25121153 Ecosystem Model for Environmental Applications
Authors: Cristina Schreiner, Romeo Ciobanu, Marius Pislaru
Abstract:
This paper aims to build a system based on fuzzy models that can be implemented in the assessment of ecological systems, to determine appropriate methods of action for reducing adverse effects on environmental and implicit the population. The model proposed provides new perspective for environmental assessment, and it can be used as a practical instrument for decision-making.Keywords: ecosystem model, environmental security, fuzzy logic, sustainability of habitable regions
Procedia PDF Downloads 42021152 The Impact of Information Communication Technology on Promoting Travel Trade Industry in a Developing Economy, Case Study Nigeria
Authors: Murtala Mohammed Alamai, Abdullahi Marshal Idris, Adama Idris
Abstract:
Today, marketing does not only involve selecting target markets, but it also involves communicating with the customers through various means to put across your selling point. Modern marketing involves driving new product development based on customer needs by getting feedback from them. Utilizing the latest technology for better communication with the customers is the latest advancement in Marketing in the 21st century. The survey approach was used where a sample of tourist destinations across the six geographical zones of the country at random was done to ascertain the use of information communication systems in promoting their products and or services, the findings revealed that only a few utilize these modern advanced means in marketing and promoting their products and a need to develop effective and up to date online services for marketing was proffered as solutions to the findings observed.Keywords: information, communication, travel, trade, promotion
Procedia PDF Downloads 32321151 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract
Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala
Abstract:
Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.Keywords: blockchain, data, data marketplace, smart contract, reputation system
Procedia PDF Downloads 15821150 Genres of Communication and Readers’ Reactions: Popular Science Magazines on Facebook
Authors: Artur Daniel Ramos Modolo
Abstract:
Popular science magazines are an important way to communicate scientific information to lay audience in science. Since the popularization of social networking sites (SNSs) such as Facebook and Twitter, these magazines are trying to adapt their content to these new media. In this study, one hundred posts of popular science magazines on Facebook are analyzed regarding the use of genres of communication and readers’ reactions. The quantitative analysis of these features considers the variety of genres and how the users of Facebook answer to them (liking, sharing and commenting). The first hypothesis was that these magazines used the genres of communication posted on Facebook both to marketing and informational purposes and that these mixed intentions have an impact in the number of readers’ reactions. In order to analyze these features, twenty timeline posts published by five magazines: Cosmos, Galileu, New Scientist, Scientific American and Superinteressante were gathered during the period of three days (6th November 2015–8th November 2015). This research shows that the hyperlinks posted by these magazines created ways to diversify the communication genres used on their pages and, at the same time, revealed that, overall, readers react quantitatively different to these genres.Keywords: Facebook, genres of communication, likes, popular science magazines, social networking sites
Procedia PDF Downloads 40221149 Implementing Online Applications to Allow Marketing Personnel to Share Their Experiences
Authors: Ishak Kamal Baskhayroun
Abstract:
This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content. The emergence of sponsorship as a new marketing communication tool and a source of competitive advantage in the marketplace has changed the entire marketing communication process. Sponsorship has overtaken other marketing communication tools in terms of growth and expenditure. This paper seeks to evaluate the role of sponsorship in marketing communication tools. The study recommends that proper measures be taken before the company embarks into sponsorship programs. This is necessary because investment in sponsorship does not always guarantee sustainable competitive advantage in the marketplace.Mobile phones are one of the direct marketing tools that can be used to reach today’s hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place.Keywords: employee organizational performance, internal marketing, internal customer, direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools corporate responsibility
Procedia PDF Downloads 5821148 Challenges in E-Government: Conceptual Views and Solutions
Authors: Rasim Alguliev, Farhad Yusifov
Abstract:
Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.Keywords: electron government, public administration, information security, web-analytics, social networks, data mining
Procedia PDF Downloads 47321147 Improving the Logistic System to Secure Effective Food Fish Supply Chain in Indonesia
Authors: Atikah Nurhayati, Asep A. Handaka
Abstract:
Indonesia is a world’s major fish producer which can feed not only its citizens but also the people of the world. Currently, the total annual production is 11 tons and expected to double by the year of 2050. Given the potential, fishery has been an important part of the national food security system in Indonesia. Despite such a potential, a big challenge is facing the Indonesians in making fish the reliable source for their food, more specifically source of protein intake. The long geographic distance between the fish production centers and the consumer concentrations has prevented effective supply chain from producers to consumers and therefore demands a good logistic system. This paper is based on our research, which aimed at analyzing the fish supply chain and is to suggest relevant improvement to the chain. The research was conducted in the Year of 2016 in selected locations of Java Island, where intensive transaction on fishery commodities occur. Data used in this research comprises secondary data of time series reports on production and distribution and primary data regarding distribution aspects which were collected through interviews with purposively selected 100 respondents representing fishers, traders and processors. The data were analyzed following the supply chain management framework and processed following logistic regression and validity tests. The main findings of the research are as follows. Firstly, it was found that improperly managed connectivity and logistic chain is the main cause for insecurity of availability and affordability for the consumers. Secondly, lack of quality of most local processed products is a major obstacle for improving affordability and connectivity. The paper concluded with a number of recommended strategies to tackle the problem. These include rationalization of the length of the existing supply chain, intensification of processing activities, and improvement of distribution infrastructure and facilities.Keywords: fishery, food security, logistic, supply chain
Procedia PDF Downloads 24121146 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.Keywords: cloud storage security, sharing storage, attributes, Hash algorithm
Procedia PDF Downloads 39021145 Innovative Power Engineering in a Selected Rural Commune
Authors: Pawel Sowa, Joachim Bargiel
Abstract:
This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.Keywords: energy security, mini energy centres , power engineering, power supply reliability
Procedia PDF Downloads 30021144 Virtualization of Production Using Digital Twin Technology
Authors: Bohuslava Juhasova, Igor Halenar, Martin Juhas
Abstract:
The contribution deals with the current situation in modern manufacturing enterprises, which is affected by digital virtualization of different parts of the production process. The overview part of this article points to the fact, that wide informatization of all areas causes substitution of real elements and relationships between them with their digital, often virtual images, in real practice. Key characteristics of the systems implemented using digital twin technology along with essential conditions for intelligent products deployment were identified across many published studies. The goal was to propose a template for the production system realization using digital twin technology as a supplement to standardized concepts for Industry 4.0. The main resulting idea leads to the statement that the current trend of implementation of the new technologies and ways of communication between industrial facilities erases the boundaries between the real environment and the virtual world.Keywords: communication, digital twin, Industry 4.0, simulation, virtualization
Procedia PDF Downloads 24921143 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 26821142 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 295