Search results for: security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7766

Search results for: security challenges

6536 Experiences of Timing Analysis of Parallel Embedded Software

Authors: Muhammad Waqar Aziz, Syed Abdul Baqi Shah

Abstract:

The execution time analysis is fundamental to the successful design and execution of real-time embedded software. In such analysis, the Worst-Case Execution Time (WCET) of a program is a key measure, on the basis of which system tasks are scheduled. The WCET analysis of embedded software is also needed for system understanding and to guarantee its behavior. WCET analysis can be performed statically (without executing the program) or dynamically (through measurement). Traditionally, research on the WCET analysis assumes sequential code running on single-core platforms. However, as computation is steadily moving towards using a combination of parallel programs and multi-core hardware, new challenges in WCET analysis need to be addressed. In this article, we report our experiences of performing the WCET analysis of Parallel Embedded Software (PES) running on multi-core platform. The primary purpose was to investigate how WCET estimates of PES can be computed statically, and how they can be derived dynamically. Our experiences, as reported in this article, include the challenges we faced, possible suggestions to these challenges and the workarounds that were developed. This article also provides observations on the benefits and drawbacks of deriving the WCET estimates using the said methods and provides useful recommendations for further research in this area.

Keywords: embedded software, worst-case execution-time analysis, static flow analysis, measurement-based analysis, parallel computing

Procedia PDF Downloads 307
6535 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 47
6534 Management Support, Role Ambiguity and Role Ambiguity among Professional Nurses at National Health Insurance Pilot Sites in South Africa: An Interpretive Phenomenology

Authors: Nomcebo N. Mpili, Cynthia Z. Madlabana

Abstract:

The South African Primary Health Care (PHC) system has undergone a number of transformations such as the introduction of National Health Insurance (NHI) to bring about easily accessible universal health coverage and to meet the health needs for all its citizens. This provides ongoing challenges to ensure that health workers are equipped with appropriate knowledge, support, and skills to meet these changes. Therefore it is crucial to understand the experiences and challenges of nurses as the backbone of PHC in providing quality healthcare services. In addition there has been a need to understand nurses’ experiences with management support, role ambiguity and role conflict amongst other challenges in light of the current reforms in healthcare. Indeed these constructs are notorious for having a detrimental impact on the outcomes of change initiatives within any organisation, this is no different in healthcare. This draws a discussion on professional nurses within the South African health care system especially since they have been labelled as the backbone of PHC, meaning any healthcare backlog falls on them. The study made use of semi-structured interviews and adopted the interpretative phenomenological approach (IPA) as the researcher aimed to explore the lived experiences of (n= 18) participants. The study discovered that professional nurses experienced a lack of management support within PHC facilities and that management mainly played an administrative and disciplinary role. Although participants mainly held positive perceptions with regards to changes happening in health care however they also expressed negative experiences in terms of how change initiatives were introduced resulting in role conflict and role ambiguity. Participants mentioned a shortage of staff, inadequate training as well as a lack of management support as some of the key challenges faced in facilities. This study offers unique findings as participants have not only experienced the various reforms within the PHC system however they have also been part of NHI pilot. The authors are not aware of any other studies published that examine management support, role conflict and role ambiguity together especially in South African PHC facilities. In conclusion understanding these challenges may provide insight and opportunities available to improve the current landscape of PHC not only in South Africa but internationally.

Keywords: management support, professional nurse, role ambiguity, role conflict

Procedia PDF Downloads 128
6533 Divergent Preferences for Rice Variety Attributes among Farmers and Breeders in Nepal

Authors: Bibek Sapkota, Michael Burton, Krishna Prasad Timsina

Abstract:

This paper presents a discrete choice experiment (DCE)-based analysis of farmers' preferences for rice variety attributes involving 540 farmers from the Terai region of Nepal clustered into East, Mid, and Western Terai regions. Findings reveal that farmers prioritize grain yield, finer grain types, drought tolerance, and shorter crop duration when selecting rice varieties, with subtle gender-based differences observed. However, breeding programs have predominantly emphasized grain yield and crop duration, possibly neglecting other vital traits. Furthermore, the research reveals a concerning decline in the yield trends of both released and registered rice varieties. Notably, the limited availability of recommended rainfed varieties, despite strong farmer preferences for drought tolerance, underscores the imperative of bridging this gap to ensure food security. This study provides insights into the multifaceted nature of farmer preferences and calls for a more holistic approach to varietal development that aligns with farmers' needs and the evolving challenges of rice farming in the Terai region of Nepal.

Keywords: breeders’ preferences, discrete choice experiment, farmers’ preferences, rice variety attributes

Procedia PDF Downloads 113
6532 Loving is Universal, Dating is not: Dating Experiences of International Students in Vancouver

Authors: Nel Jayson Santos

Abstract:

The growing number of international students in post-secondary institutions in Canada has positively contributed to the country’s economy and educational systems while also enriching cultural diversity in the classrooms. However, international students face social and relational challenges as they try to adapt to their host nation’s culture. One specific area of cultural adaptation among international students that has yet to be studied extensively is dating experiences and romantic relationships. Although numerous studies have been done regarding the relational challenges and dating experiences of American international students, only a few studies have focused on international students based in Canada. Hence, this study examines the dating preferences, dating challenges, and dating adaptations of international students based in Vancouver, Canada. Using a social constructivist approach, a semi-structured interview was conducted among fifteen heterosexual international college students. Inductive thematic analysis was then used to analyze the gathered data and identify common themes. Findings suggest that students’ (1) preferences were influenced by racial background and parental approval of dating partners; (2) students experienced language barriers and cultural differences; (3) students adapted through constant communication and being open-minded. Finally, the analysis intends to help counselors and psychologists in various colleges to help understand the issues of international students in terms of intimate and romantic relationships.

Keywords: higher education, international students, dating experiences, cultural adaptation

Procedia PDF Downloads 192
6531 The Potential of Small-Scale Urban Food Growing to Supplement Households’ Diets and Provide Health and Wellbeing Benefits

Authors: Bethany Leake, Samantha Caton, Paul Norman, Jill Edmondson

Abstract:

With the majority of the UK population residing in urban areas and with the pressures both environmentally and socially on rural agriculture, the role of urban food production, particularly urban horticulture (UH), is increasingly important in the future of UK food security. UH has the potential to provide an important contribution to urban diets and to provide additional benefits to human health and well-being. While allotments are the traditional focus of UH and play an important role, as access to this type of land is limited and unequal across cities, other forms of UH space, such as domestic growing, will need to be utilized to provide a significant contribution to urban diets. It is theorized that this smaller scale of growing may also be a more accessible way of engaging novice growers in UH. A collaborative research project, Urban Harvest, was designed between the University of Sheffield and Sheffield-based food organizations, which aimed to engage inexperienced gardeners in UH by providing them with home food-growing kits (Grow-Kits). Grow-Kits were provided to 189 participants across Sheffield in 2022, 48% of whom had never grown food before. Data collected through surveys and interviews will help us to evaluate the effect of small-scale food growing on health and wellbeing and the potential of this type of scheme to encourage future UH engagement. This data and increasing evidence on the co-benefits of UH have important implications not only for local food security but also for urban health inequalities and the potential use of this activity for preventative healthcare.

Keywords: urban horticulture, health and wellbeing, food security, nutrition

Procedia PDF Downloads 64
6530 Challenges in the Use of Information and Communication Technology in Agricultural Education and Training in Colleges of Education in Adamawa State

Authors: Harrison Gideon Maghra

Abstract:

The study was conducted on the challenges in the use of ICT in Agricultural Education and Training in Colleges of Education in Adamawa State. Three objectives guided the study, and the objectives were translated into three research questions and the research questions translated into two null hypotheses. Frequency and percentage were used to answer research question one, mean and standard deviation were used to answer research questions two and three, and t-test statistic was used to test the null hypotheses at 0.05 level of significance. The study was descriptive research and a questionnaire was used to solicit responses from the respondent. The instrument for data collection was subjected to face and content validity by 1 expert in the Department of Vocational Education, Modibbo Adama University, Yola and 3 experts from the Department of Vocational and Technical Education, Adamawa State University, Mubi. Pearson Product Moment Correlation Coefficient was used to test the reliability of the instrument and a reliability coefficient of 0.76 was obtained through the test re-test test method. Results from the study revealed that ICT facilities are not available in state-owned colleges of education. Agricultural Education lecturers have a positive attitude toward the use of ICT in teaching agricultural education and training. Based on the findings of the study, recommendations were made, among which: Colleges of Education in the state should organize training on the use of ICT for all lecturers, including those in the Agricultural Education program.

Keywords: challenges, ICT, agricultural education, colleges of education

Procedia PDF Downloads 65
6529 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 22
6528 A Case from China on the Situation of Knowledge Management in Government

Authors: Qiaoyun Yang

Abstract:

Organizational scholars have paid enormous attention on how local governments manage their knowledge during the past two decades. Government knowledge management (KM) research recognizes that the management of knowledge flows and networks is critical to reforms on government service efficiency and the effect of administration. When dealing with complex affairs, all the limitations resulting from a lack of KM concept, processes and technologies among all the involved organizations begin to be exposed and further compound the processing difficulty of the affair. As a result, the challenges for individual or group knowledge sharing, knowledge digging and organizations’ collaboration in government's activities are diverse and immense. This analysis presents recent situation of government KM in China drawing from a total of more than 300 questionnaires and highlights important challenges that remain. The causes of the lapses in KM processes within and across the government agencies are discussed.

Keywords: KM processes, KM technologies, government, KM situation

Procedia PDF Downloads 342
6527 Challenges of eradicating neglected tropical diseases

Authors: Marziye Hadian, Alireza Jabbari

Abstract:

Background: Each year, tropical diseases affect large numbers of tropical or subtropical populations and give rise to irreparable financial and human damage. Among these diseases, some are known as Neglected Tropical Disease (NTD) that may cause unusual dangers; however, they have not been appropriately accounted for. Taking into account the priority of eradication of the disease, this study explored the causes of failure to eradicate neglected tropical diseases. Method: This study was a systematized review that was conducted in January 2021 on the articles related to neglected tropical diseases on databases of Web of Science, PubMed, Scopus, Science Direct, Ovid, Pro-Quest, and Google Scholar. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines as well as Critical Appraisal Skills Program (CASP) for articles and AACODS (Authority, Accuracy, Coverage, Objectivity, Date, Significance) for grey literature (provides five criteria for judging the quality of grey information) were integrated. Finding: The challenges in controlling and eradicating neglected tropical diseases in four general themes are as follows: shortcomings in disease management policies and programs, environmental challenges, executive challenges in policy disease and research field and 36 sub-themes. Conclusion: To achieve the goals of eradicating forgotten tropical diseases, it seems indispensable to free up financial, human and research resources, proper management of health infrastructure, attention to migrants and refugees, clear targeting, prioritization appropriate to local conditions and special attention to political and social developments. Reducing the number of diseases should free up resources for the management of neglected tropical diseases prone to epidemics as dengue, chikungunya and leishmaniasis. For the purpose of global support, targeting should be accurate.

Keywords: neglected tropical disease, NTD, preventive, eradication

Procedia PDF Downloads 118
6526 Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security

Authors: Rosmini Yanti, Safira Aviolita, Marsetio

Abstract:

Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.

Keywords: archipelago state, maritime law, maritime security, traffic separation scheme

Procedia PDF Downloads 111
6525 Establishing Digital Forensics Capability and Capacity among Malaysia's Law Enforcement Agencies: Issues, Challenges and Recommendations

Authors: Sarah Taylor, Nor Zarina Zainal Abidin, Mohd Zabri Adil Talib

Abstract:

Although cybercrime is on the rise, yet many Law Enforcement Agencies in Malaysia faces difficulty in establishing own digital forensics capability and capacity. The main reasons are undoubtedly because of the high cost and difficulty in convincing their management. A survey has been conducted among Malaysia’s Law Enforcement Agencies owning a digital forensics laboratory to understand their history of building digital forensics capacity and capability, the challenges and the impact of having own laboratory to their case investigation. The result of the study shall be used by other Law Enforcement Agencies in justifying to their management to establish own digital forensics capability and capacity.

Keywords: digital forensics, digital forensics capacity and capability, laboratory, law enforcement agency

Procedia PDF Downloads 220
6524 Current Strategic Trends – A Comparative Analysis of Hungarian Corporations

Authors: Gyula Fülöp, Bettina Hernádi

Abstract:

This paper deals with the current strategic challenges related to the reshaping of the basic conditions of corporate operations. With the help of the experimental analysis of some domestic corporations, it presents the form and extent the Hungarian corporations are prepared for the current strategic challenges. The study examines how strategic directions and answer opportunities changed in the following interrelated areas in the past five years: economic globalization, corporate sustainability, IT applications, labour force diversity and ethical competences. The conclusions of the empirical survey give a reliable basis for economic organizations and enterprises to formulate their strategy.

Keywords: economic globalization, corporate sustainability, IT applications, labour force diversity, ethical competences

Procedia PDF Downloads 379
6523 Quality of Life of Elderly and Factors Associated in Bharatpur Metropolitan City, Chitwan: A Mixed Method Study

Authors: Rubisha Adhikari, Rajani Shah

Abstract:

Introduction: Aging is a natural, global and inevitable phenomenon every single person has to go through, and nobody can escape the process. One of the emerging challenges to public health is to improve the quality of later years of life as life expectancy continues to increase. Quality of life (QoL) has grown to be a key goal for many public health initiatives. Population aging has become a global phenomenon as they are growing more quickly in emerging nations than they are in industrialized nations, leaving minimal opportunities to regulate the consequences of the demographic shift. Methods: A community-based descriptive analytical approach was used to examine the quality of life and associated factors among elderly people. A mixed method was chosen for the study. For the quantitative data collection, a household survey was conducted using the WHOQOL-OLD tool. In-depth interviews were conducted among twenty participants for qualitative data collection. Data generated through in-depth interviews were transcribed verbatim. In-depth interviews lasted about an hour and were audio recorded. The in-depth interview guide had been developed by the research team and pilot-tested before actual interviews. Results: This study result showed the association between quality of life and socio-demographic variables. Among all the variables under socio-demographic variable of this study, age (ꭓ2=14.445, p=0.001), gender (ꭓ2=14.323, p=<0.001), marital status (ꭓ2=10.816, p=0.001), education status (ꭓ2=23.948, p=<0.001), household income (ꭓ2=13.493, p=0.001), personal income (ꭓ2=14.129, p=0.001), source of personal income (ꭓ2=28.332,p=<0.001), social security allowance (ꭓ2=18.005,p=<0.001), alcohol consumption (ꭓ2=9.397,p=0.002) are significantly associated with quality of life of elderly. In addition, affordability (ꭓ2=12.088, p=0.001), physical activity (ꭓ2=9.314, p=0.002), emotional support (ꭓ2=9.122, p=0.003), and economic support (ꭓ2=8.104, p=0.004) are associated with quality of life of elderly people. Conclusion: In conclusion, this mixed method study provides insight into the attributes of the quality of life of elderly people in Nepal and similar settings. As the geriatric population is growing in full swing, maintaining a high quality of life has become a major challenge. This study showed that determinants such as age, gender, marital status, education status, household income, personal income, source of personal income, social security allowance and alcohol consumption, economic support, emotional support, affordability and physical activity have an association with quality of life of the elderly.

Keywords: ageing, chitwan, elderly, health status, quality of life

Procedia PDF Downloads 47
6522 Social Media Factor in Security Environment

Authors: Cetin Arslan, Senol Tayan

Abstract:

Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.

Keywords: democracy, disorder, security, Social Media

Procedia PDF Downloads 348
6521 An Investigation into the Strategies Adopted by Women Entrepreneurs to Ensure Small Business Success in Nkonkobe Municipality, Eastern Cape Province, South Africa

Authors: Agholor Deborah Ewere, Emmanuel Ade, Seriki Idowu

Abstract:

The role women entrepreneur plays to combat unemployment should not be underestimated, especially in countries with growing unemployment rates such as South Africa. Women entrepreneurs contribute significantly to economic development in South Africa, but their contribution has not been adequately studied and developed. Hence, the study identified business strategies adopted by women entrepreneurs to sustain growth and development of entrepreneurship. Survey research design approach was adopted and convenience sampling method was used for sample selection. The structured questionnaire was used to elicit information from the respondents. The findings revealed some of the operational challenges women entrepreneur faced to include lack of finance, marketing skills and planning and also showed that the strategies adopted by women entrepreneurs have a positive effect on the success of small businesses. It was recommended among others that the women entrepreneurs should take some time to study the nature of challenges other women have faced in business and possibly provide solutions to such issues before starting their own business. It was however concluded that unless the operational challenges named above are resolved, the role of women entrepreneurs in the developing nations will continue to experience deprived economic growth, development and display substandard competitiveness.

Keywords: business, entrepreneurs, small, strategies, success, women

Procedia PDF Downloads 443
6520 A Reinforcement Learning Based Method for Heating, Ventilation, and Air Conditioning Demand Response Optimization Considering Few-Shot Personalized Thermal Comfort

Authors: Xiaohua Zou, Yongxin Su

Abstract:

The reasonable operation of heating, ventilation, and air conditioning (HVAC) is of great significance in improving the security, stability, and economy of power system operation. However, the uncertainty of the operating environment, thermal comfort varies by users and rapid decision-making pose challenges for HVAC demand response optimization. In this regard, this paper proposes a reinforcement learning-based method for HVAC demand response optimization considering few-shot personalized thermal comfort (PTC). First, an HVAC DR optimization framework based on few-shot PTC model and DRL is designed, in which the output of few-shot PTC model is regarded as the input of DRL. Then, a few-shot PTC model that distinguishes between awake and asleep states is established, which has excellent engineering usability. Next, based on soft actor criticism, an HVAC DR optimization algorithm considering the user’s PTC is designed to deal with uncertainty and make decisions rapidly. Experiment results show that the proposed method can efficiently obtain use’s PTC temperature, reduce energy cost while ensuring user’s PTC, and achieve rapid decision-making under uncertainty.

Keywords: HVAC, few-shot personalized thermal comfort, deep reinforcement learning, demand response

Procedia PDF Downloads 58
6519 Vulnerability of Indian Agriculture to Climate Change: A Study of the Himalayan Region State

Authors: Rajendra Kumar Isaac, Monisha Isaac

Abstract:

Climate variability and changes are the emerging challenges for Indian agriculture with the growing population to ensure national food security. A study was conducted to assess the Climatic Change effects in medium to low altitude areas of the Himalayan region causing changes in land use and cereal crop productivity with the various climatic parameters. The rainfall and temperature changes from 1951 to 2013 were studied at four locations of varying altitudes, namely Hardwar, Rudra Prayag, Uttar Kashi and Tehri Garwal. It was observed that there is noticeable increment in temperature on all the four locations. It was surprisingly observed that the mean rainfall intensity of 30 minutes duration has increased at the rate of 0.1 mm/hours since 2000. The study shows that the combined effect of increasing temperature, rainfall, runoff and urbanization at the mid-Himalayan region is causing an increase in various climatic disasters and changes in agriculture patterns. A noticeable change in cropping patterns, crop productivity and land use change was observed. Appropriate adaptation and mitigation strategies are necessary to ensure that sustainable and climate-resilient agriculture. Appropriate information is necessary for farmers, as well as planners and decision makers for developing, disseminating and adopting climate-smart technologies.

Keywords: climate variability, agriculture, land use, mitigation strategies

Procedia PDF Downloads 257
6518 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 54
6517 Impacts of Sociological Dynamics on Entomophagy Practice and Food Security in Nigeria

Authors: O. B. Oriolowo, O. J. John

Abstract:

Empirical findings have shown insects to be nutritious and good source of food for man. However, human food preferences are not only determined by nutritional values of food consumed but, more importantly, by sociology and economic pressure. This study examined the interrelation between science and sociology in sustaining the acceptance of entomophagy among college students to combat food insecurity. A twenty items five Likert scale, College Students Entomophagy Questionnaire (CSEQ), was used to elucidate information from the respondents. The reliability coefficient was obtained to be 0.91 using Spearman-Brown Prophecy formula. Three research questions and three hypotheses were raised. Also, quantitative nutritional analysis of few insects and some established conventional protein sources were undertaking in order to compare their nutritional status. The data collected were analyzed using descriptive statistics of percentages and inferential statistics of correlation and Analysis of Variance (ANOVA). The results obtained showed that entomophagy has cultural heritage among different tribes in Nigeria and is an acceptable practice; it cuts across every social stratum and is practiced among both major religions. Moreover, insects compared favourably in term of nutrient contents when compared with the conventional animal protein sources analyzed. However, there is a gradual decline in the practice of entomophagy among students, which may be attributed to the influence of western civilization. This study, therefore, recommended an intensification of research and enlightenment of people on the usefulness of entomophagy so as to preserve its cultural heritage as well as boost human food security.

Keywords: entomophagy, food security, malnutrition, poverty alleviation, sociology

Procedia PDF Downloads 104
6516 Potential of the Bri and the Indo-Pacific in South Asia: A Comparative Case Study

Authors: Nahian Salsabeel, Faria Leera

Abstract:

—“Whoever controls the Indian Ocean, dominates Asia. This ocean is the key to the seven seas. In the 21st century, the destiny of the world will be decided on its waters” -Alfred Mahan South Asia is increasingly becoming a hub for international politics. Numerous ventures are taking place in the strategic region. Of them, the most prominent is the Belt and Road Initiative (BRI). Originating from the concept of ancient Silk Route, the Chinese Xi Jin Ping regime looks to reestablish the vast connectivity project to connect the world through infrastructure and trade. On the other hand, the US, teamed up with India, Australia and Japan, thereby forming the Quad, have launched their own foreign policy, the Indo-Pacific Strategy. The ambitious 21st century initiative for the development of maritime trade, security and governance focuses critical importance to the Indo-Pacific region, especially to South Asia. Against the backdrop of contemporary political scenario, both the Quad and China airs to establish their own footprint across the region through respective mega projects, the Indo-Pacific Strategy and the BRI. This research employs a comparative case study research method, using a secondary research design. The paper looks at the variety of opportunities and challenges posed by the BRI and the Indo Pacific, and gives the comparative study on both ends.

Keywords: BRI, Foreign Policy, Indo-Pacific, South Asia

Procedia PDF Downloads 143
6515 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 321
6514 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 39
6513 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 345
6512 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 429
6511 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 190
6510 Challenges and Problems of the Implementation of the Individual's Right to a Safe and Clean Environment

Authors: Dalia Perkumiene

Abstract:

The process of globalization has several unforeseen negative effects on the quality of the environment, including increased pollution, climate change, and the depletion and destruction of natural resources. The impact of these processes makes it difficult to guarantee citizens' rights to a clean environment, and complex legal solutions are needed to implement this right. In order to implement human rights in a clean and safe environment, international legal documents and court rulings are analyzed. It is important to find a balance between the legal context: the right to a clean environment and environmental challenges such as climate change and global warming. Research Methods: The following methods were used in this study: analytical, analysis, and synthesis of scientific literature and legal documents, comparative analysis of legal acts, and generalization. Major Findings: It is difficult to implement the right to a clean, safe and sustainable environment. The successful implementation of this right depends on the application of various complex ideas and rational, not only legal solutions. Legislative measures aim to maximize the implementation of citizens' rights in the face of climate change and other environmental challenges. This area remains problematic, especially in international law. Concluding Statement: The right to a clean environment should allow a person to live in a harmonious system, where environmental factors do not pose a risk to human health and well-being.

Keywords: clean and safe and clean environmen, environmen, persons’ rights, right to a clean and safe and clean environment

Procedia PDF Downloads 177
6509 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 133
6508 A Scoping Review to Explore the Policies and Procedures Addressing the Implementation of Inclusive Education in BRICS Countries

Authors: Bronwyn S. Mthimunye, Athena S. Pedro, Nicolette V. Roman

Abstract:

Inclusive education is a global concern, in the context of Brazil, Russia, India, China, and South Africa. These countries are all striving for inclusive education, as there are many children excluded from formal schooling. The need for inclusive education is imperative, given the increase in special needs diagnoses. Many children confronted with special needs are still not able to exercise their basic right to education. The aim of conducting this scoping review was to explore the policies and procedures addressing the implementation of inclusive education in Brazil, Russia, India, China, and South Africa. The studies included were published between 2006-2016 and located in Academic Search Complete, ERIC, Medline, PsycARTICLES, JSTOR, and SAGE Journals. Seven articles were included in which all of the articles reported on inclusive education and the status of implementation. The findings identified many challenges faced by Brazil, Russia, India, China, and South Africa that affect the implementation of policies and programmes. Challenges such as poor planning, resource-constrained communities, lack of professionals in schools, and the need for adequate teacher training were identified. Brazil, Russia, India, China, and South Africa are faced with many social and economic challenges, which serves as a barrier to the implementation of inclusive education.

Keywords: special needs, inclusion, education, scoping review

Procedia PDF Downloads 280
6507 Exploring the Challenges and Opportunities in Clinical Waste Management: The Case of Private Clinics, Selangor, Malaysia

Authors: Golyasamin Khanehzaei, Mohd. Bakri Ishak, Ahmad Makmom Hj Abdullah, Latifah Abd Manaf

Abstract:

Abstract—Management of clinical waste is a critical problem worldwide. Immediate attention is required to manage the clinical waste in an appropriate way in newly developing economy country such as Malaysia. The increasing amount of clinical waste generated is resulted from rapid urbanization and growing number of private health care facilities in developing countries such as Malaysia. In order to develop a sensible clinical waste management system and improvement of the management, information on factors affecting clinical waste generation has the crucial role. This paper is the study of management characteristics of clinical waste and the level of efficiency of clinical waste management systems operating in private clinics located in Selangor, Malaysia. Are they following the proper international standards? By taking all of this in consideration the aim of this paper is to identify and discuss the current trend, current challenges and also the present opportunities among the challenges of clinical waste management in private clinics of Selangor, Malaysia. The SWOT analysis was characterized for the evaluation of strengths, weaknesses, opportunities and threats. The methodology for this study was constituted of direct observation, Informal interviews, Conducting SWOT analysis, conduction of one sustainability dimensions analysis and application. The results show that clinical waste management in private clinics is far from an ideal model.

Keywords: clinical waste, SWOT analysis, Selangor, Malaysia

Procedia PDF Downloads 333