Search results for: performance vs. security
14067 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005
Procedia PDF Downloads 16714066 How Cyber Insurers and Managed Security Companies Influence the Content and Meaning of Privacy Law and Cybersecurity Compliance
Authors: Shauhin Talesh
Abstract:
Cyber risks--loss exposure associated with the use of electronic equipment, computers, information technology, and virtual reality--are among the biggest threats facing businesses and consumers. Despite these threats, private organizations are not significantly changing their behavior in response. Although many organizations do have formal cybersecurity policies in place, the majority believe they are insufficiently prepared for cybersecurity incidences, and have not conducted proper risk assessments or invested necessary training and resources to protect consumers’ electronic information. Drawing on empirical observations over the past 5 years, this article explains why insurers who manage cybersecurity and privacy law compliance among organizations have not been more successful in curtailing breaches. The analysis draws on Talesh's “new institutional theory of insurance,” which explains how insurers shape the content and meaning of law among organizations that purchase insurance. In response to vague and fragmented privacy laws and a lack of strong government oversight, insurers offer cyber insurance and a series of risk-management services to their customers. These services convey legitimacy to the public and to the insureds but fall short of improving the robustness of organizations, rendering them largely symbolic. Cyber insurers and managed security companies have flooded the market with high-level technical tools that they claim mitigate risk, but all they've really accomplished is to institutionalize a norm that policyholders need these tools to avoid cybersecurity incidents. Federal and state regulators and industry-based rating agencies have deferred to cyber insurers without evidence that these tools actually improve security.Keywords: regulation, compliance, insurance, cybersecurity, privacy law, organizations, risk management
Procedia PDF Downloads 1114065 Performance Evaluation of Different Technologies of PV Modules in Algeria
Authors: Amira Balaska, Ali Tahri, Amine Boudghene Stambouli, Takashi Oozeki
Abstract:
This paper is dealing with the evaluation of photovoltaic modules as part of the Sahara Solar Breeder project (SSB), five different photovoltaic module technologies which are: m-si, CIS, HIT, Back Contact, a-si_μc -si and a weather station recently installed at the University of Saida (Tahar Moulay) in Saida city located at the gate of the great southern Algeria’s Sahara. The objective of the present work is the study of solar photovoltaic capacity and performance parameters of each PV module technology. The goal of the study is to compare the five different PV technologies in order to find which technologies are suitable for the climate conditions of Algeria’s desert. Measurements of various parameters as irradiance, temperature, humidity and so on by the weather station and I-V curves were performed outdoors at the location without shadow. Finally performance parameters as performance ratio, energy yield and temperature losses are given and analyzed.Keywords: photovoltaic modules, performance ratio, energy yield, sahara solar breeder, outdoor conditions
Procedia PDF Downloads 66214064 Supervised/Unsupervised Mahalanobis Algorithm for Improving Performance for Cyberattack Detection over Communications Networks
Authors: Radhika Ranjan Roy
Abstract:
Deployment of machine learning (ML)/deep learning (DL) algorithms for cyberattack detection in operational communications networks (wireless and/or wire-line) is being delayed because of low-performance parameters (e.g., recall, precision, and f₁-score). If datasets become imbalanced, which is the usual case for communications networks, the performance tends to become worse. Complexities in handling reducing dimensions of the feature sets for increasing performance are also a huge problem. Mahalanobis algorithms have been widely applied in scientific research because Mahalanobis distance metric learning is a successful framework. In this paper, we have investigated the Mahalanobis binary classifier algorithm for increasing cyberattack detection performance over communications networks as a proof of concept. We have also found that high-dimensional information in intermediate features that are not utilized as much for classification tasks in ML/DL algorithms are the main contributor to the state-of-the-art of improved performance of the Mahalanobis method, even for imbalanced and sparse datasets. With no feature reduction, MD offers uniform results for precision, recall, and f₁-score for unbalanced and sparse NSL-KDD datasets.Keywords: Mahalanobis distance, machine learning, deep learning, NS-KDD, local intrinsic dimensionality, chi-square, positive semi-definite, area under the curve
Procedia PDF Downloads 7914063 Additive White Gaussian Noise Filtering from ECG by Wiener Filter and Median Filter: A Comparative Study
Authors: Hossein Javidnia, Salehe Taheri
Abstract:
The Electrocardiogram (ECG) is the recording of the heart’s electrical potential versus time. ECG signals are often contaminated with noise such as baseline wander and muscle noise. As these signals have been widely used in clinical studies to detect heart diseases, it is essential to filter these noises. In this paper we compare performance of Wiener Filtering and Median Filtering methods to filter Additive White Gaussian (AWG) noise with the determined signal to noise ratio (SNR) ranging from 3 to 5 dB applied to long-term ECG recordings samples. Root mean square error (RMSE) and coefficient of determination (R2) between the filtered ECG and original ECG was used as the filter performance indicator. Experimental results show that Wiener filter has better noise filtering performance than Median filter.Keywords: ECG noise filtering, Wiener filtering, median filtering, Gaussian noise, filtering performance
Procedia PDF Downloads 52914062 Effect of Color on Anagram Solving Ability
Authors: Khushi Chhajed
Abstract:
Context: Color has been found to have an impact on cognitive performance. Due to the negative connotation associated with red, it has been found to impair performance on intellectual tasks. Aim: This study aims to assess the effect of color on individuals' anagram solving ability. Methodology: An experimental study was conducted on 66 participants in the age group of 18–24 years. A self-made anagram assessment tool was administered. Participants were expected to solve the tool in three colors- red, blue and grey. Results: A lower score was found when presented with the color blue as compared to red. The study also found that participants took relatively greater time to solve the red colored sheet. However these results are inconsistent with pre-existing literature. Conclusion: Hence, an association between color and performance on cognitive tasks can be seen. Future directions and potential limitations are discussed.Keywords: color psychology, experiment, anagram, performance
Procedia PDF Downloads 8814061 The Effects of Planting Date on the Yield and Yield Components of Corn (Zea mays L.) Cultivar, Single Cross 704
Authors: Mehranoosh Gholipoor
Abstract:
The effects of planting date on performance and yield components of maize single cross 704 was carried out in 2003.this experiment was designed in randomized complete block pattern with 3 replications in the field of College campus of Agricultural Sciences and Natural Resources in Gorgan. Treatments consisted of four planting dates (May5, May19, June4 and June19) respectively. The results showed that the planting on June4 were the best time for planting date in the field of seed performance and many other measurement qualities while planting date on June19 had the lowest seed performance in corn, due to a severe reduction in seed numbers had the highest In 1000 seed weight. Between the planting date on May 5 and May19 were observed no significant differencesKeywords: corn, planting date, performance and yield components
Procedia PDF Downloads 35814060 Interaction Effects of Vitamin D Supplementation and Aerobic Exercises on Balance and Physical Performance in Children with Down Syndrome
Authors: Mohamed A. Eid, Sobhy M. Aly, Marwa M. Ibrahim, Nadia L. Radwan
Abstract:
To investigate the interaction effects of vitamin D supplementation combined with aerobic exercises (AE) and conventional physical therapy program (CPTP) on balance and physical performance in children with Down syndrome (DS).Methods: A randomized controlled trial was conducted for 38 children with DS, with ages ranging from 8 to 12 years. They were divided randomly to two groups. The control group (n=19) received the CPTP, while the study group (n=19) received the CPTP, AE, and vitamin D in the form of an oral daily dose of vitamin D3 400 IU (Cholecalciferol). Evaluation of balance by using the Biodex Stability System and physical performance by using the six-minute walk test (6MWT)was performed before and after 12 weeks of the treatment program. Findings: All groups showed a significant improvement in balance and physical performance after treatment (p < 0.05). The study group showed a significant improvement in balance and physical performancecompared with that of the control group (p < 0.05). Conclusion: Vitamin D supplementation combined with AE and CPTP could improve balance and physical performance in children with DS. Therefore, vitamin D and AEshould be considered as adjunctive to the rehabilitation program of these children.Keywords: aerobic exercises, balance, down syndrome, physical performance, vitamin D
Procedia PDF Downloads 23714059 Total Quality Management in Companies Manufacturing
Authors: Malki Nadia Fatima Zahra, Kellal Cheimaa, Brahimi Houria
Abstract:
Aim of the study is to show the role of total Quality Management on firm performance; the research relied on the views of sample managers working in the Marinel pharmaceutical company. The research aims to achieve many objectives, including increasing awareness of the concepts of Total Quality Management on Firm Performance, especially in the manufacturing firm, providing a future vision of the possibility of success, and the actual application of the Principles of Total Quality Management in the manufacturing company. The research adopted a default model was built after a review and analysis of the literature review in the context of one hypothesis main points at the origin of a group of sub-hypotheses. The research presented a set of conclusions, and the most important of these conclusions was there is a relationship between the Principles of TQM and Firm Performance.Keywords: total quality management, TQM dimension, firm performance, strategies
Procedia PDF Downloads 7214058 The Impact of Child Maltreatment on School Performance in Saudi Arabia
Authors: Al Muneef Maha, Al Tamimi Dana
Abstract:
Introduction: Child maltreatment was proven to negatively impact children’s and adolescent’s academic performances; showing less academic achievements, problems completing homework assignments, and was marginally associated with being frequently absent from school (1). Objectives: To identify the impact of child maltreatment on school performance among adolescents in National Guard Schools. Materials and Methods: The study was conducted at National Guard schools in Riyadh. Students aged 12-19 years were invited to participate. Participants (N=674) completed the survey instrument which included demographics, exposure to different types of abuse, and overall level of academic performance. Results: Participants’ mean age was 15.6±1.6 years and males (53%). Ninety-five percent lived with both parents, 2% with single parent, and 3% with step parents. Four percent lived with alcoholic parents or guardians, and 7% have lived with a family member who has been arrested or imprisoned. Poor performance (failure in exam) were more likely among the students who lived with alcoholics vs. non-alcoholics (33% vs. 11%, p<0.01), imprisoned family member vs. non-imprisoned (26% vs. 11%, p<0.01), psychologically abused vs. not abused (21% vs. 10%, p<0.01), physically abused vs. not abused (19% vs. 9%, p<0.01). Predisposing factors to poor performance in school included living with alcoholic parents or guardians (OR=2.8, CI=1.1-6.7), psychologically abused (OR=1.7, CI=1.0-3.0), and physically abused (OR=1.7, CI=1.0-2.8). Conclusions: The results suggest that child maltreatment may adversely impact school performance. These findings highlight the importance of increasing the awareness about the impact of child maltreatment on school performance among families, schools, and the community. Recommend to the Ministry of Education to consider counseling of students with poor performance due to adverse child experiences or maltreatment.Keywords: child abuse, child maltreatment, school performance, Saudi Arabia
Procedia PDF Downloads 32614057 Non-Invasive Data Extraction from Machine Display Units Using Video Analytics
Authors: Ravneet Kaur, Joydeep Acharya, Sudhanshu Gaur
Abstract:
Artificial Intelligence (AI) has the potential to transform manufacturing by improving shop floor processes such as production, maintenance and quality. However, industrial datasets are notoriously difficult to extract in a real-time, streaming fashion thus, negating potential AI benefits. The main example is some specialized industrial controllers that are operated by custom software which complicates the process of connecting them to an Information Technology (IT) based data acquisition network. Security concerns may also limit direct physical access to these controllers for data acquisition. To connect the Operational Technology (OT) data stored in these controllers to an AI application in a secure, reliable and available way, we propose a novel Industrial IoT (IIoT) solution in this paper. In this solution, we demonstrate how video cameras can be installed in a factory shop floor to continuously obtain images of the controller HMIs. We propose image pre-processing to segment the HMI into regions of streaming data and regions of fixed meta-data. We then evaluate the performance of multiple Optical Character Recognition (OCR) technologies such as Tesseract and Google vision to recognize the streaming data and test it for typical factory HMIs and realistic lighting conditions. Finally, we use the meta-data to match the OCR output with the temporal, domain-dependent context of the data to improve the accuracy of the output. Our IIoT solution enables reliable and efficient data extraction which will improve the performance of subsequent AI applications.Keywords: human machine interface, industrial internet of things, internet of things, optical character recognition, video analytics
Procedia PDF Downloads 11114056 Simultaneous Relationship among Strategic Corporate Social Responsibility, Corporate Governance, and Firm Performance: Evidence from Indonesia
Authors: Ayu Diar Sari, Sidharta Utama
Abstract:
The main objective of this study is to examine the empirical association among strategic corporate social responsibility (Strategic CSR), corporate governance (CG), and firm performance by investigating their causal effects. In order to get the comprehensive result, this study uses CSR variables which consist of Strategic CSR, Non-Strategic CSR and CSR as a whole. Exerting the two stage least square (2SLS) method, the result showed that CG mechanism positively influences CSR, Non-Strategic CSR, and firm performance (both ROA and PBV). CSR and Non-Strategic CSR positively influence ROA. Meanwhile CSR, Strategic and Non-Strategic CSR positively influence PBV. Firm’s Strategic CSR engagement plays a significantly positive role in enhancing PBV. The results supported the social impact hypothesis, agency theory, and conflict resolution theory.Keywords: corporate financial performance, corporate governance, corporate social responsibility, strategic corporate social responsibility
Procedia PDF Downloads 30214055 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks
Authors: Manoj Kumar Dutta
Abstract:
Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput
Procedia PDF Downloads 45214054 The Lethal Autonomy and Military Targeting Process
Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk
Abstract:
The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)
Procedia PDF Downloads 42914053 Inappropriate Job Behaviour and Performance of Employees
Authors: Prakash Singh
Abstract:
The focus of this paper is on the impact of internal organizational factors on the inappropriate job performance and behaviour of employees. The Buffalo City Metropolitan Municipality (BCMM) in South Africa has been experiencing inappropriate job behaviour and performance of some of its workers. They include misappropriation of resources, maladministration, mismanagement, lack of service delivery, fraud, and corruption. Since many workers in this organization have various levels of formal education, such practices are not expected, because the structural-functionalist assumption is that formal education is a solution to societal challenges. Since inappropriate job behaviour and performance continue to be reported in spite of the formal education of BCMM workers, this study seeks to investigate how the two phenomena co-exist. It thus seeks to put into perspective the paradoxical co-existence of formal education with inappropriate job behaviour and performance, by focusing on the BCMM as a case-study. For data collection, this study used the mixed method approach; that is, a combination of qualitative and quantitative methods. The findings revealed structural, systemic and human impediments to labour productivity in the organization. By and large, the unquestioning acceptance of the assumption that the skills shortage is responsible for inappropriate workers’ job performance and behaviour is discredited by the evidence of skilled personnel who exercise their responsibilities in a manner that undermines their occupational requirements. Therefore, this exploratory study affirms that the narrow conception of skills, that privileges job-specific capabilities, is not enough for cultivating a workforce with appropriate job behaviour and performance practices.Keywords: inappropriate job behaviour, labour productivity, mismanagement, skills shortage
Procedia PDF Downloads 37314052 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 25014051 Computational Analysis of Adaptable Winglets for Improved Morphing Aircraft Performance
Authors: Erdogan Kaygan, Alvin Gatto
Abstract:
An investigation of adaptable winglets for enhancing morphing aircraft performance is described in this paper. The concepts investigated consist of various winglet configurations fundamentally centered on a baseline swept wing. The impetus for the work was to identify and optimize winglets to enhance the aerodynamic efficiency of a morphing aircraft. All computations were performed with Athena Vortex Lattice modelling with varying degrees of twist and cant angle considered. The results from this work indicate that if adaptable winglets were employed on aircraft’s improvements in aircraft performance could be achieved.Keywords: aircraft, drag, twist, winglet
Procedia PDF Downloads 58514050 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges
Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold
Abstract:
If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience
Procedia PDF Downloads 18914049 Investigation on Optical Performance of Operational Shutter Panels for Transparent Displays
Authors: Jaehong Kim, Sunhee Park, HongSeop Shin, Kyongho Lim, Suhyun Kwon, Don-Gyou Lee, Pureum Kim, Moojong Lim, JongSang Baek
Abstract:
Transparent displays with OLEDs are the most commonly produced forms of see-through displays on the market or in development. In order to block the visual interruption caused by the light coming from the background, the special panel is combined with transparent displays with OLEDs. There is, however, few studies optical performance of operational shutter panel for transparent displays until now. This paper, therefore, describes the optical performance of operational shutter panels. The novel evaluation method was developed by measuring the amount of light which can form a transmitted background image. The new proposed method could tell how recognize transmitted background images cannot be seen, and is consistent with viewer’s perception.Keywords: transparent display, operational shutter panel, optical performance, OLEDs
Procedia PDF Downloads 44514048 PUF-Based Lightweight Iot Secure Authentication Chip Design
Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He
Abstract:
This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.Keywords: PUF, IoT, authentication, secure communication, encryption, XOR
Procedia PDF Downloads 14214047 Effect of Film Cooling on Gas-Turbine Engine Turbine
Authors: Burak Kaplan, Ünver Kaynak
Abstract:
Gas turbine engines, crucial for modern aviation and power generation, rely on the efficient operation of turbine blades. However, extreme temperatures and pressures can lead to material degradation and failure. Film cooling, a widely employed technique, injects a coolant onto the blade surface to mitigate the effects of hot gas exposure. This research investigates the impact of film cooling on gas turbine engine performance, focusing on its influence on efficiency, longevity, and overall engine performance. Through a comprehensive literature review, computational fluid dynamics simulations, and thermal performance analysis, this study aims to provide insights into optimizing film cooling configurations for enhanced engine performance. The research explores the thermal performance characteristics of turbine blades with and without film cooling, the influence of various film cooling techniques on engine efficiency, and the design factors that optimize film cooling effectiveness. The findings of this study have the potential to contribute to the development of more efficient and reliable gas turbine engines, ultimately advancing the field of gas turbine technology.Keywords: gas turbine, engine, cooling, blade, optimization
Procedia PDF Downloads 1114046 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy
Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi
Abstract:
Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.Keywords: terrorism, economy, Boko Haram, Nigeria
Procedia PDF Downloads 26314045 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce
Authors: Neelima Rashmi Lakra
Abstract:
India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.Keywords: public sectors, social justice, social security schemes, trade union movement
Procedia PDF Downloads 45214044 Experimental Study on Strength and Durability Properties of Bio-Self-Cured Fly Ash Based Concrete under Aggressive Environments
Authors: R. Malathy
Abstract:
High performance concrete is not only characterized by its high strength, workability, and durability but also by its smartness in performance without human care since the first day. If the concrete can cure on its own without external curing without compromising its strength and durability, then it is said to be high performance self-curing concrete. In this paper, an attempt is made on the performance study of internally cured concrete using biomaterials, namely Spinacea pleracea and Calatropis gigantea as self-curing agents, and it is compared with the performance of concrete with existing self-cure chemical, namely polyethylene glycol. The present paper focuses on workability, strength, and durability study on M20, M30, and M40 grade concretes replacing 30% of fly ash for cement. The optimum dosage of Spinacea pleracea, Calatropis gigantea, and polyethylene glycol was taken as 0.6%, 0.24%, and 0.3% by weight of cement from the earlier research studies. From the slump tests performed, it was found that there is a minimum variation between conventional concrete and self-cured concrete. The strength activity index is determined by keeping compressive strength of conventionally cured concrete for 28 days as unity and observed that, for self-cured concrete, it is more than 1 after 28 days and more than 1.15 after 56 days because of secondary reaction of fly ash. The performance study of concretes in aggressive environment like acid attack, sea water attack, and chloride attack was made, and the results are positive and encouraging in bio-self-cured concretes which are ecofriendly, cost effective, and high performance materials.Keywords: bio materials, Calatropis gigantea, self curing concrete, Spinacea oleracea
Procedia PDF Downloads 34714043 ChaQra: A Cellular Unit of the Indian Quantum Network
Authors: Shashank Gupta, Iteash Agarwal, Vijayalaxmi Mogiligidda, Rajesh Kumar Krishnan, Sruthi Chennuri, Deepika Aggarwal, Anwesha Hoodati, Sheroy Cooper, Ranjan, Mohammad Bilal Sheik, Bhavya K. M., Manasa Hegde, M. Naveen Krishna, Amit Kumar Chauhan, Mallikarjun Korrapati, Sumit Singh, J. B. Singh, Sunil Sud, Sunil Gupta, Sidhartha Pant, Sankar, Neha Agrawal, Ashish Ranjan, Piyush Mohapatra, Roopak T., Arsh Ahmad, Nanjunda M., Dilip Singh
Abstract:
Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission.Keywords: quantum network, quantum key distribution, quantum security, quantum information
Procedia PDF Downloads 5814042 The Effect of Human Relation on Employee Performance at Faculty of Economics of Syiah Kuala University
Authors: Yurnalis Usman
Abstract:
In an organization, institution or enterprise, human resource is very important aspect since many human skills cannot be replaced by technology tools even though technology has advanced rapidly now. The relationship among people is very necessary to create a subordinate and leader relation in the assumption that human beings are creatures who have feeling, desires, needs, aspirations and ideas differing from one another. This study on human relation was conducted at the Faculty of Economics of UNSYIAH, Darussalam, Banda Aceh, while the research object is associated with human relations and employee performance in Faculty of Economics of UNSYIAH. To determine the extent of employee relations in Faculty of Economics with fellow employees or superiors, the employees are given some questions. The result shows that human relations influence the employee performance at Faculty of Economics UNSYIAH strongly.Keywords: human relation, employee performance, communication, Syiah Kuala
Procedia PDF Downloads 28714041 Field Study for Evaluating Winter Thermal Performance of Auckland School Buildings
Authors: Bin Su
Abstract:
Auckland has a temperate climate with comfortable warm, dry summers and mild, wet winters. An Auckland school normally does not need air conditioning for cooling during the summer and only needs heating during the winter. The Auckland school building thermal design should more focus on winter thermal performance and indoor thermal comfort for energy efficiency. This field study of testing indoor and outdoor air temperatures, relative humidity and indoor surface temperatures of three classrooms with different envelopes were carried out in the Avondale College during the winter months in 2013. According to the field study data, this study is to compare and evaluate winter thermal performance and indoor thermal conditions of school buildings with different envelopes.Keywords: building envelope, building mass effect, building thermal comfort, building thermal performance, school building
Procedia PDF Downloads 42914040 The Effects of Learning Engagement on Interpreting Performance among English Major Students
Authors: Jianhua Wang, Ying Zhou, Xi Zhang
Abstract:
To establish the influential mechanism of learning engagement on interpreter’s performance, the present study submitted a questionnaire to a sample of 927 English major students with 804 valid ones and used the structural equation model as the basis for empirical analysis and statistical inference on the sample data. In order to explore the mechanism for interpreting learning engagement on student interpreters’ performance, a path model of interpreting processes with three variables of ‘input-environment-output’ was constructed. The results showed that the effect of each ‘environment’ variable on interpreting ability was different from and greater than the ‘input’ variable, and learning engagement was the greatest influencing factor. At the same time, peer interaction on interpreting performance has significant influence. Results suggest that it is crucial to provide effective guidance for optimizing learning engagement and interpreting teaching research by both improving the environmental support and building the platform of peer interaction, beginning with learning engagement.Keywords: learning engagement, interpreting performance, interpreter training, English major students
Procedia PDF Downloads 20714039 The Relationship between Class Attendance and Performance of Industrial Engineering Students Enrolled for a Statistics Subject at the University of Technology
Authors: Tshaudi Motsima
Abstract:
Class attendance is key at all levels of education. At tertiary level many students develop a tendency of not attending all classes without being aware of the repercussions of not attending all classes. It is important for all students to attend all classes as they can receive first-hand information and they can benefit more. The student who attends classes is likely to perform better academically than the student who does not. The aim of this paper is to assess the relationship between class attendance and academic performance of industrial engineering students. The data for this study were collected through the attendance register of students and the other data were accessed from the Integrated Tertiary Software and the Higher Education Data Analyzer Portal. Data analysis was conducted on a sample of 93 students. The results revealed that students with medium predicate scores (OR = 3.8; p = 0.027) and students with low predicate scores (OR = 21.4, p < 0.001) were significantly likely to attend less than 80% of the classes as compared to students with high predicate scores. Students with examination performance of less than 50% were likely to attend less than 80% of classes than students with examination performance of 50% and above, but the differences were not statistically significant (OR = 1.3; p = 0.750).Keywords: class attendance, examination performance, final outcome, logistic regression
Procedia PDF Downloads 13414038 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 114