Search results for: security environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11054

Search results for: security environment

9824 Enhancing Sustainability Awareness through Social Learning Experiences on Campuses

Authors: Rashika Sharma

Abstract:

The campuses at tertiary institutes can act as a social environment for peer to peer connections. However, socialization is not the only aspect that campuses provide. The campus can act as a learning environment that has often been termed as the campus curriculum. Many tertiary institutes have taken steps to make their campus a ‘green campus’ whereby initiatives have been taken to reduce their impact on the environment. However, as visible as these initiatives are, it is debatable whether these have any effect on students’ and their understanding of sustainable campus operations. Therefore, research was conducted to evaluate the effectiveness of sustainable campus operations in raising students’ awareness of sustainability. Students at two vocational institutes participated in this interpretive research with data collected through surveys and focus groups. The findings indicated that majority of vocational education students remained oblivious of sustainability initiatives on campuses.

Keywords: campus learning, education for sustainability, social learning, vocational education

Procedia PDF Downloads 268
9823 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 409
9822 Analysis of the Environmental Impact of Selected Small Heat and Power Plants Operating in Poland

Authors: M. Stelmachowski, M. Wojtczak

Abstract:

The aim of the work was to assess the environmental impact of the selected small and medium-sized companies supplying heat and electricity to the cities with a population of about 50,000 inhabitants. Evaluation and comparison of the impact on the environment have been carried out for the three plants producing heat and two CHP plants with particular attention to emissions into the atmosphere and the impact of introducing a system of trading carbon emissions of these companies.

Keywords: CO2 emission, district heating, heat and power plant, impact on environment

Procedia PDF Downloads 463
9821 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 149
9820 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis

Authors: F. Felipe

Abstract:

Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.

Keywords: air defense, effectiveness, system, simulation, decision-support

Procedia PDF Downloads 150
9819 Oil Exploration in the Niger Delta and the Right to a Healthy Environment

Authors: Olufunke Ayilara Aje-Famuyide

Abstract:

The centrality of the Petroleum Industry in the world energy is undoubted. The world economy almost runs and depends on petroleum. Petroleum industry is a multi-trillion industry; it turns otherwise poor and underdeveloped countries into wealthy nations and thrusts them at the center of international diplomacy. Although these developing nations lack the necessary technology to explore and exploit petroleum resources they are not without help as developed nations, represented by their multinational corporations are ready and willing to provide both the technical and managerial expertise necessary for the development of this natural resource. However, the exploration of these petroleum resources comes with, sometimes, grave, concomitant consequences. These consequences are especially pronounced with respect to the environment. From the British Petroleum Oil rig explosion and the resultant oil spillage and pollution in New Mexico, United States to the Mobil Oil spillage along Nigerian coast, the story and consequence is virtually the same. Nigeria’s Niger Delta Region produces Nigeria’s petroleum which accounts for more than ninety-five percent of Nigeria’s foreign exchange earnings. Between 1999 and 2007, Nigeria earned more than $400 billion from petroleum exports. Nevertheless, petroleum exploration and exploitation has devastated the Niger Delta environment. From oil spillage which pollutes the rivers, farms and wetlands to gas flaring by the multi-national corporations; the consequences is similar-a region that has been devastated by petroleum exploitation. This paper thus seeks to examine the consequences and impact of petroleum pollution in the Niger Delta of Nigeria with particular reference on the right of the people of Niger Delta to a healthy environment. The paper further seeks to examine the relevant international, regional instrument and Nigeria’s municipal laws that are meant to protect the result of the people of the Niger Delta and their enforcement by the Nigerian State. It is quite worrisome that the Niger Delta Region and its people have suffered and are still suffering grave violations of their right to a healthy environment as a result of petroleum exploitation in their region. The Nigerian effort at best is half-hearted in its protection of the people’s right.

Keywords: environment, exploration, petroleum, pollution

Procedia PDF Downloads 415
9818 Decision Making for Industrial Engineers: From Phenomenon to Value

Authors: Ali Abbas

Abstract:

Industrial Engineering is a broad multidisciplinary field with intersections and applications in numerous areas. In out current environment, the path from a phenomenon to value involves numerous people with expertise in various areas including domain knowledge of a field and the ability to make decisions within an operating environment that lead to value creation. We propose some skills that industrial engineering programs should focus on, and argue that an industrial engineer is a decision maker instead of a problem solver.

Keywords: decision analysis, problem-solving, value creation, industrial engineering

Procedia PDF Downloads 359
9817 An Environmentally Friendly Approach towards the Conservation of Vernacular Architecture

Authors: Maria Philokyprou, Aimilios Michael

Abstract:

Contemporary theories of sustainability, concerning the natural and built environment, have recently introduced an environmental attitude towards the architectural design that, in turn, affects the practice of conservation and reuse of the existing building stock. This paper presents an environmentally friendly approach towards the conservation of vernacular architecture and it is based on the results of a research program which involved the investigation of sustainable design elements of traditional buildings in Cyprus. The research in question showed that Cypriot vernacular architecture gave more emphasis on cooling rather than heating strategies. Another notable finding of the investigation was the great importance given to courtyards as they enhance considerably, and in various ways, the microclimatic conditions of the immediate environment with favorable results throughout the year. Moreover, it was shown that the reduction in temperature fluctuation observed in the closed and semi-open spaces, compared to the respective temperature fluctuation of the external environment - due to the thermal inertia of the building envelope - helps towards the achievement of more comfortable living conditions within traditional dwellings. This paper concludes with a proposal of a sustainable approach towards the conservation of the existing environment and the introduction of new environmental criteria for the conservation of traditional buildings, beyond the aesthetic, morphological and structural ones that are generally applied.

Keywords: bioclimatic, conservation, environmental, traditional dwellings, vernacular architecture

Procedia PDF Downloads 510
9816 Maintaining Biodiversity Through Environmental Conservation Awareness Program in Nigeria School Sectors

Authors: Oluwasegun A. Oke, Mayowa A. Abolaji, Oluwaseun A. Adefila

Abstract:

Environmental problems have become a priority on the world political agenda for the last two decades and this is inevitably linked with the general degradation of our environment which calls for ultimate attention. Therefore, this study searched for better and more involving methods of imparting environmental knowledge to average learner with the view of creating awareness, increasing knowledge as well as changing their attitude positively towards conservation of the environment. The study also investigated the effectiveness of conservation club in creating awareness (among students) about environmental conservation. About 240 Students were randomly selected for data collection using validated instruments (questionnaires). T-test statistics, chi-square and simple percentage were the major statistical tools employed in data analysis. This study revealed that environmental conservation club plays a vital role in creating awareness as well as promoting students understanding of environmental issues to promote positive attitude towards natural environment.

Keywords: environmental conservation, biodiversity, awareness program, environmental disasters

Procedia PDF Downloads 271
9815 Exposure to Natural Outdoor Environment and Positive Health Impacts: A Synthesis of Empirical Research

Authors: Joris Zufferey, Roderick John Lawrence

Abstract:

This paper provides an overview of the state of the art about the positive health impacts of exposure to natural outdoor environments. It presents the results of a “review of reviews” in terms of empirical evidence and identifies some key questions. Finally, the authors stress the need to develop more interdisciplinary and systemic contributions. This synthesis of empirical research has been done as part of the EU- FP7 PHENOTYPE research project.

Keywords: Exposure, environment, phenotype, salutogenic effects

Procedia PDF Downloads 382
9814 Using Sea Cucumber for Mitigation of Marine Pollution

Authors: A. Al-Yaqout, A. Al-Alawi, T. Al-Said, E. Al-Enezi, M. Al-Roumi

Abstract:

Kuwait’s marine environment suffers from increased organic pollution. Sea cucumbers play an important role in the marine environment. They create a healthier environment for many types of benthic micro-organisms through their slow movement and feeding mechanism on micro-organisms and organic material. A preliminary study has been conducted in Kuwait Institute for Scientific Research to assess the possibility of using sea cucumbers for mitigation of the coastal pollution. Sediments were collected from locations identified to be heavily loaded with organic pollutants. Ten aquaria glass tanks, 65x 40x 30cm will be supplied with 10 cm height (14 kg) of the sediments added in each tank and filled with 70 L of filtered seawater. Two species were used in this study, Stichopus hermanni, and Holothuria atra. Water and sediment samples were analyzed weekly. The results showed promising possibility for using sea cucumber to lower the organic load in sediments.

Keywords: organic pollution, sea cucumbers, mitigation, Stichopus hermanni, Holothuria atra

Procedia PDF Downloads 297
9813 Environment-Specific Political Risk Discourse, Environmental Reputation, and Stock Price Crash Risk

Authors: Sohanur Rahman, Elisabeth Sinnewe, Larelle (Ellie) Chapple, Sarah Osborne

Abstract:

Greater political attention to global climate change exposes firms to a higher level of political uncertainty, which can lead to adverse capital market consequences. However, a higher level of discourse on environment-specific political risk (EPR) between management and investors can mitigate information asymmetry, followed by less stock price crash risk. This study examines whether EPR discourse in discourse in the earnings conference calls (ECC) reduces firm-level stock price crash risk in the US market. This research also explores if adverse disclosures via media channels further moderates the association between EPR on crash risk. Employing a dataset of 28,933 firm-year observations from 2002 to 2020, the empirical analysis reveals that EPR discourse in ECC reduces future stock price crash risk. However, adverse disclosures via media channels can offset the favourable effect of EPR discourse on crash risk. The results are robust to the potential endogeneity concern in a quasi-natural experiment setting.

Keywords: earnings conference calls, environment, environment-specific political risk discourse, environmental disclosures, information asymmetry, reputation risk, stock price crash risk

Procedia PDF Downloads 122
9812 The Role of Communicative Grammar in Cross-Cultural Learning Environment

Authors: Tonoyan Lusine

Abstract:

The Communicative Grammar (CG) of a language deals with semantics and pragmatics in the first place as communication is a process of generating speech. As it is well known people can communicate with the help of limited word expressions and grammatical means. As to non-verbal communication, both vocabulary and grammar are not essential at all. However, the development of the communicative competence lies in verbal, non-verbal, grammatical, socio-cultural and intercultural awareness. There are several important issues and environment management strategies related to effective communication that one might need to consider for a positive learning experience. International students bring a broad range of cultural perspectives to the learning environment, and this diversity has the capacity to improve interaction and to enrich the teaching/learning process. Intercultural setting implies creative and thought-provoking work with different cultural worldviews and international perspectives. It is worth mentioning that the use of Communicative Grammar models creates a profound background for the effective intercultural communication.

Keywords: CG, cross-cultural communication, intercultural awareness, non-verbal behavior

Procedia PDF Downloads 378
9811 The Human Right to a Safe, Clean and Healthy Environment in Corporate Social Responsibility's Strategies: An Approach to Understanding Mexico's Mining Sector

Authors: Thalia Viveros-Uehara

Abstract:

The virtues of Corporate Social Responsibility (CSR) are explored widely in the academic literature. However, few studies address its link to human rights, per se; specifically, the right to a safe, clean and healthy environment. Fewer still are the research works in this area that relate to developing countries, where a number of areas are biodiversity hotspots. In Mexico, despite the rise and evolution of CSR schemes, grave episodes of pollution persist, especially those caused by the mining industry. These cases set up the question of the correspondence between the current CSR practices of mining companies in the country and their responsibility to respect the right to a safe, clean and healthy environment. The present study approaches precisely such a bridge, which until now has not been fully tackled in light of Mexico's 2011 constitutional human rights amendment and the United Nation's Guiding Principles on Business and Human Rights (UN Guiding Principles), adopted by the Human Rights Council in 2011. To that aim, it initially presents a contextual framework; it then explores qualitatively the adoption of human rights’ language in the CSR strategies of the three main mining companies in Mexico, and finally, it examines their standing with respect to the UN Guiding Principles. The results reveal that human rights are included in the RSE strategies of the analysed businesses, at least at the rhetoric level; however, they do not embrace the right to a safe, clean and healthy environment as such. Moreover, we conclude that despite the finding that corporations publicly express their commitment to respect human rights, some operational weaknesses that hamper the exercise of such responsibility persist; for example, the systematic lack of human rights impact assessments per mining unit, the denial of actual and publicly-known negative episodes on the environment linked directly to their operations, and the absence of effective mechanisms to remediate adverse impacts.

Keywords: corporate social responsibility, environmental impacts, human rights, right to a safe, clean and healthy environment, mining industry

Procedia PDF Downloads 316
9810 Effect of Pressure and Dissolved Oxygen on Stress Corrosion Cracking Susceptibility of Inconel 617 in Steam and Supercritical Water

Authors: Hasan Izhar Khan, Naiqiang Zhang, Hong Xu, Zhongliang Zhu, Dongfang Jiang

Abstract:

Inconel 617, a nickel-based alloy designed for high-temperature applications, got an excellent amalgamation of strength and oxidation resistance at high temperatures. For a better understanding of its suitability to be used in superheater and reheater tubes in ultra-supercritical power plants, stress corrosion cracking (SCC) susceptibility must be evaluated. In the present study, the effect of medium environment on SCC behavior of Inconel 617, in the form of a round bar tensile specimen, was tested via slow strain rate tensile tests in steam and supercritical water (SCW) at 650 °C. The results showed that SCC susceptibility has a linear relationship with exposed pressure and increases monotonically with an increase in pressure. A severe SCC susceptibility was observed in SCW followed by that in a steam environment. Fracture and gage surface showed apparent characteristics of brittle fracture. Intergranular cracks initiated from the edge region and propagated into the matrix through cross section until ductile rupture. When dissolved oxygen contents were decreased in SCW environment, it showed no noticeable effect on mechanical properties but SCC susceptibility slightly decreased. The research revealed the influence of environment on SCC susceptibility of Inconel 617 in steam and SCW.

Keywords: Inconel 617, steam, supercritical water, stress corrosion cracking

Procedia PDF Downloads 141
9809 Petrologic and Geochemical Characteristics of Marine Sand Strip in the Proterozoic Chuanlinggou Formation of the North China

Authors: Yue Feng, Chun-jiang Wang, Zhi-long Huang

Abstract:

The study of the sedimentary environment of Mesoproterozoic marine deposits in North China has attracted special attention in recent years. It is not clear that the sedimentary environment and the cause of formation of the sandstone strip and its internal carbonate cements and pyrite in the Mesoproterozoic Chuanlinggou Formation in North China. In this study, drilling core samples in North China were identified by microscopy, and their petrological characteristics such as mineral composition and structure were identified. The geochemical data of carbon and oxygen isotopes, total organic carbon (TOC) contents and total sulfur (TS) contents were obtained by processing and analyzing the samples. The samples are mainly quartz particles with low compositional maturity, combined with low value of TOC, it shows that the sedimentary environment of the sandy clastic is a sandy littoral sedimentary environment with relative strong hydrodynamic force, and then the sandstone strip in black shale are formed by the deposition of gravity flow. Analysis of TS values reflect sandstone bands formed in hypoxic environments. The carbonate cements and the pyrite in the sandstone belt are authigenic. The carbon isotope values of authigenic carbonate cements are negatively biased in comparison with the carbonate isotope of carbonate rocks in the same period, but it is more biased than the carbon isotopic values of anaerobic oxidation of methane (AOM) genetic carbonate rocks. Authigenic pyrite may be mainly due to the formation of HS- by the action of bacterial sulfate reduction (BSR) and Fe²⁺, their causes are in contact. This indicates that authigenic carbonate cements are mainly carbonate precipitates formed but are significantly affected by the effects of AOM. Summary, the sedimentary environment of the sandstone zone in the Chuanlinggou Formation in the North China is a shallow sea facies with iron rich and anoxic.

Keywords: sandstone strip, sedimentary environment, authigenic carbonate cements, authigenic pyrite, The Chuanlinggou group, North China

Procedia PDF Downloads 131
9808 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan

Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed

Abstract:

This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.

Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis

Procedia PDF Downloads 46
9807 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 377
9806 Future of the Supply Chain Management

Authors: Mehmet Şimşek

Abstract:

In the rapidly changing market conditions, it is getting harder to survive without adapting new abilities. Technology and globalization have enabled foreign producers to enter into national markets, even local ones. For this reason there is now big competition among production companies for market share. Furthermore, competition has provided customer with broad range of options to choose from. To be able to survive in this environment, companies need to produce at low price and at high quality. The best way to succeed this is the efficient use of supply chain management that has started to get shaped by the needs of customers and the environment.

Keywords: cycle time, logistics, outsourcing, production, supply chain

Procedia PDF Downloads 470
9805 On Adaptive and Auto-Configurable Apps

Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger

Abstract:

Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.

Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home

Procedia PDF Downloads 385
9804 Intelligent Building as a Pragmatic Approach towards Achieving a Sustainable Environment

Authors: Zahra Hamedani

Abstract:

Many wonderful technological developments in recent years has opened up the possibility of using intelligent buildings for a number of important applications, ranging from minimizing resource usage as well as increasing building efficiency to maximizing comfort, adaption to inhabitants and responsiveness to environmental changes. The concept of an intelligent building refers to the highly embedded, interactive environment within which by exploiting the use of artificial intelligence provides the ability to know its configuration, anticipate the optimum dynamic response to prevailing environmental stimuli, and actuate the appropriate physical reaction to provide comfort and efficiency. This paper contains a general identification of the intelligence paradigm and its impacts on the architecture arena, that with examining the performance of artificial intelligence, a mechanism to analyze and finally for decision-making to control the environment will be described. This mechanism would be a hierarchy of the rational agents which includes decision-making, information, communication and physical layers. This multi-agent system relies upon machine learning techniques for automated discovery, prediction and decision-making. Then, the application of this mechanism regarding adaptation and responsiveness of intelligent building will be provided in two scales of environmental and user. Finally, we review the identifications of sustainability and evaluate the potentials of intelligent building systems in the creation of sustainable architecture and environment.

Keywords: artificial intelligence, intelligent building, responsiveness, adaption, sustainability

Procedia PDF Downloads 396
9803 Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy

Authors: Nyumbaiza Tambwe

Abstract:

The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice.

Keywords: alternative strategy, food security, household strategy, hybrid urban agriculture

Procedia PDF Downloads 312
9802 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 379
9801 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints

Authors: Zongjie Wang, Zhizhong Guo

Abstract:

While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.

Keywords: optimal power flow, time period, security, economy

Procedia PDF Downloads 435
9800 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 351
9799 Barriers to Sports Participation as a Means of Achieving Sustainable Development in Michael Otedola College of Primary Education

Authors: Osifeko Olalekan Remigious, Osifeko Christiana Osikorede, Folarin Bolanle Eunice, Olugbenga Adebola Shodiya

Abstract:

In this period of economic problem, nations are looking for avenues to improve their economy, preserve their environment and socio-political environment, educational institutions are not left out as there is the need for them to increase their economy and preserve their socio political environment. Sports is one of the ways through which sustainable development can be achieved. The purpose of this study was to examine the barriers to sports participation. A total of 1025 students were purposively selected from all the five schools in the College. A questionnaire which has a reliability coefficient of 0.71 was used for data collection. Data collected were subjected to the descriptive survey research design. Findings showed that facilities, funds and lectures schedule were significant barriers to sports participation. It was recommended that sports facilities should be provided by the Lagos State government.

Keywords: MOCPED sports, sustainable development, sports participation, state government

Procedia PDF Downloads 308
9798 Early Formation of Adipocere in Subtropical Climate

Authors: Asit K. Sikary, O. P. Murty

Abstract:

Adipocere formation is a modification of the process of putrefaction. It consists mainly of saturated fatty acids, formed by the post-mortem hydrolysis and hydrogenation of body fats with the help of bacterial enzymes in the presence of warmth, moisture and anaerobic bacteria. In temperate climate, it takes weeks to develop while in India it starts to begin within 4-5 days. In this study, we have collected cases with adipocere formation, which were from the South Delhi region (average room temperature 27-390C) and autopsied at our centre. Details of the circumstances of the death, cause and time of death, surrounding environment and demographic profile of the deceased were taken into account. Total 16 cases were included in this study. Adipocere formation was predominantly present over cheeks, shoulder, breast, flanks, buttocks, and thighs. Out of 16, 11 cases were found in a dry atmosphere, 5 cases were brought from the water. There were 5 cases in which adipocere formation was seen in less than 2 days, and among them, in 1 case, as early as one day. This study showed that adipocere formation can be seen as early as 1 day in a hot and humid environment.

Keywords: adipocere, drowning, hanging, humid environment, strangulation, subtropical climate

Procedia PDF Downloads 410
9797 Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy

Authors: Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang

Abstract:

The wireless communication network is developing rapidly, thus the wireless security becomes more and more important. Specific emitter identification (SEI) is an vital part of wireless communication security as a technique to identify the unique transmitters. In this paper, a SEI method based on multiscale dispersion entropy (MDE) and refined composite multiscale dispersion entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE are used to extract features for identification of five wireless devices and cross-validation support vector machine (CV-SVM) is used as the classifier. The experimental results show that the total identification accuracy is 99.3%, even at low signal-to-noise ratio(SNR) of 5dB, which proves that MDE and RCMDE can describe the communication signal series well. In addition, compared with other methods, the proposed method is effective and provides better accuracy and stability for SEI.

Keywords: cross-validation support vector machine, refined com- posite multiscale dispersion entropy, specific emitter identification, transient signal, wireless communication device

Procedia PDF Downloads 119
9796 E–Learning System in Virtual Learning Environment to Develop Problem Solving Ability and Team Learning for Learners in Higher Education

Authors: Noawanit Songkram

Abstract:

This paper is a report on the findings of a study conducted on e–learning system in virtual learning environment to develop problem solving ability and team learning for learners in higher education. The methodology of this study was R&D research. The subjects were 18 undergraduate students in Faculty of Education, Chulalongkorn University in the academic year of 2013. The research instruments were a problem solving ability assessment, a team learning evaluation form, and an attitude questionnaire. The data was statistically analyzed using mean, standard deviation, one way repeated measure ANOVA and t–test. The research findings discovered the e –learning system in virtual learning environment to develop problem solving ability and team learning for learners in higher education consisted of five components:(1) online collaborative tools, (2) active learning activities, (3) creative thinking, (4) knowledge sharing process, (5) evaluation and nine processes which were (1) preparing in group working, (2) identifying interested topic, (3) analysing interested topic, (4) collecting data, (5) concluding idea (6) proposing idea, (7) creating workings, (8) workings evaluation, (9) sharing knowledge from empirical experience.

Keywords: e-learning system, problem solving ability, team leaning, virtual learning environment

Procedia PDF Downloads 427
9795 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 240