Search results for: transportation security
2887 Gas Flow, Time, Distance Dynamic Modelling
Authors: A. Abdul-Ameer
Abstract:
The equations governing the distance, pressure- volume flow relationships for the pipeline transportation of gaseous mixtures, are considered. A derivation based on differential calculus, for an element of this system model, is addressed. Solutions, yielding the input- output response following pressure changes, are reviewed. The technical problems associated with these analytical results are identified. Procedures resolving these difficulties providing thereby an attractive, simple, analysis route are outlined. Computed responses, validating thereby calculated predictions, are presented.Keywords: pressure, distance, flow, dissipation, models
Procedia PDF Downloads 4732886 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)
Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram
Abstract:
The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)
Procedia PDF Downloads 952885 On the Effectiveness of Electricity Market Development Strategies: A Target Model for a Developing Country
Authors: Ezgi Avci-Surucu, Doganbey Akgul
Abstract:
Turkey’s energy reforms has achieved energy security through a variety of interlinked measures including electricity, gas, renewable energy and energy efficiency legislation; the establishment of an energy sector regulatory authority; energy price reform; the creation of a functional electricity market; restructuring of state-owned energy enterprises; and private sector participation through privatization and new investment. However, current strategies, namely; “Electricity Sector Reform and Privatization Strategy” and “Electricity Market and Supply Security Strategy” has been criticized for various aspects. The present paper analyzes the implementation of the aforementioned strategies in the framework of generation scheduling, transmission constraints, bidding structure and general aspects; and argues the deficiencies of current strategies which decelerates power investments and creates uncertainties. We conclude by policy suggestions to eliminate these deficiencies in terms of price and risk management, infrastructure, customer focused regulations and systematic market development.Keywords: electricity markets, risk management, regulations, balancing and settlement, bilateral trading, generation scheduling, bidding structure
Procedia PDF Downloads 5532884 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods
Authors: Issa Qabaja, Fadi Thabtah
Abstract:
Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.Keywords: data mining, email classification, phishing, online security
Procedia PDF Downloads 4322883 Robots for City Life: Design Guidelines and Strategy Recommendations for Introducing Robots in Cities
Authors: Akshay Rege, Lara Gomaa, Maneesh Kumar Verma, Sem Carree
Abstract:
The aim of this paper is to articulate design strategies and recommendations for introducing robots into the city life of people based on experiments conducted with robots and semi-autonomous systems in three cities in the Netherlands. This research was carried out by the Spot robotics team of Impact Lab housed within YES!Delft, a start-up accelerator located in Delft, The Netherlands. The premise of this research is to inform the development of the ‘region of the future’ by the Municipality of Rotterdam-Den Haag (MRDH). The paper starts by reporting the desktop research carried out to find and develop multiple use cases for robots to support humans in various activities. Further, the paper reports the user research carried out by crowdsourcing responses collected in public spaces of Rotterdam-Den Haag region and on the internet. Furthermore, based on the knowledge gathered in the initial research, practical experiments were carried out using robots and semi-autonomous systems in order to test and validate our initial research. These experiments were conducted in three cities in the Netherlands which were Rotterdam, The Hague, and Delft. Custom sensor box, Drone, and Boston Dynamics' Spot robot were used to conduct these experiments. Out of thirty use cases, five were tested with experiments which were skyscraper emergency evacuation, human transportation and security, bike lane delivery, mobility tracking, and robot drama. The learnings from these experiments provided us with insights into human-robot interaction and symbiosis in cities which can be used to introduce robots in cities to support human activities, ultimately enabling the transitioning from a human only city life towards a blended one where robots can play a role. Based on these understandings, we formulated design guidelines and strategy recommendations for incorporating robots in the Rotterdam-Den Haag’s region of the future. Lastly, we discuss how our insights in the Rotterdam-Den Haag region can inspire and inform the incorporation of robots in different cities of the world.Keywords: city life, design guidelines, human-robot Interaction, robot use cases, robotic experiments, strategy recommendations, user research
Procedia PDF Downloads 972882 Packet Fragmentation Caused by Encryption and Using It as a Security Method
Authors: Said Rabah Azzam, Andrew Graham
Abstract:
Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.Keywords: fragmentation, encryption, security, switch
Procedia PDF Downloads 3352881 Gendered Mobility: Deep Distributions in Urban Transport Systems in Delhi
Authors: Nidhi Prabha
Abstract:
Transportation as a sector is one of the most significant infrastructural elements of the ‘urban.' The distinctness of an urban life in a city is marked by the dynamic movements that it enables within the city-space. Therefore it is important to study the public-transport systems that enable and foster mobility which characterizes the urban. It is also crucial to underscore the way one is examining the urban transport systems - either as an infrastructural unit in a strict physical-structural sense or as a structural unit which acts as a prism refracting multiple experiences depending on the location of the ‘commuter.' In the proposed paper, the attempt is to uncover and investigate the assumption of the neuter-commuter by looking at urban transportation in the secondary sense i.e. as a structural unit which is experienced differently by different kinds of commuters, thus making transportation deeply distributed with various social structures and locations like class or gender which map onto the transport systems. To this end, the public-transit systems operating in Urban Delhi i.e. the Delhi Metros and the Delhi Transport Corporation run public-buses are looked at as case studies. The study is premised on the knowledge and data gained from both primary and secondary sources. Primary sources include data and knowledge collected from fieldwork, the methodology for which has ranged from adopting ‘mixed-methods’ which is ‘Qualitative-then-Quantitative’ as well as borrowing ethnographic techniques. Apart from fieldwork, other primary sources looked at including Annual Reports and policy documents of the Delhi Metro Rail Corporation (DMRC) and the Delhi Transport Corporation (DTC), Union and Delhi budgets, Economic Survey of Delhi, press releases, etc. Secondary sources include the vast array of literature available on the critical nodes that inform the research like gender, transport geographies, urban-space, etc. The study indicates a deeply-distributed urban transport system wherein the various social-structural locations or different kinds of commuters map onto the way these different commuters experience mobility or movement within the city space. Mobility or movement, therefore, becomes gendered or has class-based ramifications. The neuter-commuter assumption is thus challenged. Such an understanding enables us to challenge the anonymity which the ‘urban’ otherwise claims it provides over the rural. The rural is opposed to the urban wherein urban ushers a modern way of life, breaking ties of traditional social identities. A careful study of the transport systems through the traveling patterns and choices of the commuters, however, indicate that this does not hold true as even the same ‘public-space’ of the transport systems allocates different places to different kinds of commuters. The central argument made though the research done is therefore that infrastructure like urban-transport-systems has to be studied and examined as seen beyond just a physical structure. The various experiences of daily mobility of different kinds of commuters have to be taken into account in order to design and plan more inclusive transport systems.Keywords: gender, infrastructure, mobility, urban-transport-systems
Procedia PDF Downloads 2262880 Risk Management and Security Practice in Customs Supply Chain: Application of Cross ABC Method to the Moroccan Customs
Authors: Lamia Hammadi, Abdellah Ait Ouhman, Aomar Ibourk
Abstract:
It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.Keywords: cross ABC method, customs supply chain, risk, risk management
Procedia PDF Downloads 3792879 Importance of Location Selection of an Energy Storage System in a Smart Grid
Authors: Vanaja Rao
Abstract:
In the recent times, the need for the integration of Renewable Energy Sources (RES) in a Smart Grid is on the rise. As a result of this, associated energy storage systems are known to play important roles in sustaining the efficient operation of such RES like wind power and solar power. This paper investigates the importance of location selection of Energy Storage Systems (ESSs) in a Smart Grid. Three scenarios of ESS location is studied and analyzed in a Smart Grid, which are – 1. Near the generation/source, 2. In the middle of the Grid and, 3. Near the demand/consumption. This is explained with the aim of assisting any Distribution Network Operator (DNO) in deploying the ESSs in a power network, which will significantly help reduce the costs and time of planning and avoid any damages incurred as a result of installing them at an incorrect location of a Smart Grid. To do this, the outlined scenarios mentioned above are modelled and analyzed with the National Grid’s datasets of energy generation and consumption in the UK power network. As a result, the outcome of this analysis aims to provide a better overview for the location selection of the ESSs in a Smart Grid. This ensures power system stability and security along with the optimum usage of the ESSs.Keywords: distribution networks, energy storage system, energy security, location planning, power stability, smart grid
Procedia PDF Downloads 2982878 Mathematical Model and Algorithm for the Berth and Yard Resource Allocation at Seaports
Authors: Ming Liu, Zhihui Sun, Xiaoning Zhang
Abstract:
This paper studies a deterministic container transportation problem, jointly optimizing the berth allocation, quay crane assignment and yard storage allocation at container ports. The problem is formulated as an integer program to coordinate the decisions. Because of the large scale, it is then transformed into a set partitioning formulation, and a framework of branchand- price algorithm is provided to solve it.Keywords: branch-and-price, container terminal, joint scheduling, maritime logistics
Procedia PDF Downloads 2932877 Factors That Influence Choice of Walking Mode in Work Trips: Case Study of Rasht, Iran
Authors: Nima Safaei, Arezoo Masoud, Babak Safaei
Abstract:
In recent years, there has been a growing emphasis on the role of urban planning in walking capability and the effects of individual and socioeconomic factors on the physical activity levels of city dwellers. Although considerable number of studies are conducted about walkability and for identifying the effective factors in walking mode choice in developed countries, to our best knowledge, literature lacks in the study of factors affecting choice of walking mode in developing countries. Due to the high importance of health aspects of human societies and in order to make insights and incentives for reducing traffic during rush hours, many researchers and policy makers in the field of transportation planning have devoted much attention to walkability studies; they have tried to improve the effective factors in the choice of walking mode in city neighborhoods. In this study, effective factors in walkability that have proven to have significant impact on the choice of walking mode, are studied at the same time in work trips. The data for the study is collected from the employees in their workplaces by well-instructed people using questionnaires; the statistical population of the study consists of 117 employed people who commute daily from work to home in Rasht city of Iran during the beginning of spring 2015. Results of the study which are found through the linear regression modeling, show that people who do not have freedom of choice for choosing their living locations and need to be present at their workplaces in certain hours have lower levels of walking. Additionally, unlike some of the previous studies which were conducted in developed countries, coincidental effects of Body Mass Index (BMI) and the income level of employees, do not have a significant effect on the walking level in work travels.Keywords: BMI, linear regression, transportation, walking, work trips
Procedia PDF Downloads 1962876 Contribution at Dimensioning of the Energy Dissipation Basin
Authors: M. Aouimeur
Abstract:
The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment
Procedia PDF Downloads 5832875 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool
Authors: D. Subedi, S. Pradhan
Abstract:
Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics
Procedia PDF Downloads 4152874 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security
Authors: Godiya Atsiya Pius
Abstract:
The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.Keywords: insurgency, gender, violence, security, vulnerable groups
Procedia PDF Downloads 4722873 Linking Access to Land, Tenure Security with Food Sufficiency of Tenants/Landless or Small Holder Farmers of Parsa District
Authors: Subesh Panta
Abstract:
The land is a one of the major boosting factors of production for the agricultural country like Nepal where access to land has been a major source of livelihood of tenants and small farmers. But there is an absence of secure land tenure arrangement which drastically affect the overall production of farmers leading towards food insecurity. Sharecropping is practiced in Nepal especially in tarai region from early period, but there is the gap in the academic study whether the sharecropping has benefitted tenant farmers and make them food sufficient or not. This study attempts to find out the food sufficiency among the tenant households. The research was carried in the three VDCs of Parsa district -Paterwa (Sugauli), Jitpur and Nirchuta. A total of 111 households were determined as the sample size from each of the three VDCs was randomly visited for interview in the study. The size of land rent-in was found to be very small and fragmented. At the same time, the land tenure security was not found to be secured among the tenants. Due to lack of land tenure security, on one hand tenants and small farmers were not found to be motivated to investment in agriculture as they need to share fifty percent of their production with the land owners, and on other hand land owners were also not interested in investing as they have other alternative sources of livelihood rather than agriculture. In conclusion, the study highpoint that the crop production and food sufficiency level of the tenants’ farmers of the Parsa district are decreasing. Many tenants’ farmers are seeking alternative opportunities for livelihood rather than sharecropping due to insecure land tenure, feudalistic practice, lack of storage for agriculture production, lack of proper agro-market. The situation is such that, if no action is taken timely, there may be a situation that we will have to depend on imports for all the food requirements. Thus, the study discloses that the sharecropping could act as catalyst for ensuring food sufficiency for all, if proper land tenure police are promoted to tenants/small farmers with legal titles to their land or promoted with sustainable agriculture methods.Keywords: agriculture, food sufficiency, land, tenant farmes
Procedia PDF Downloads 2352872 Crop Losses, Produce Storage and Food Security, the Nexus: Attaining Sustainable Maize Production in Nigeria
Authors: Charles Iledun Oyewole, Harira Shuaib
Abstract:
While fulfilling the food security of an increasing population like Nigeria remains a major global concern, more than one-third of crop harvested is lost or wasted during harvesting or in postharvest operations. Reducing the harvest and postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, eliminate hunger and improve farmers’ livelihoods. Nigeria is one of the countries in sub-Saharan Africa with insufficient food production and high food import bill, which has had debilitating effects on the country’s economy. One of the goals of Nigeria’s agricultural development policy is to ensure that, the nation produces enough food and be less dependent on importation so as to ensure adequate and affordable food for all. Maize could fill the food gap in Nigeria’s effort to beat hunger and food insecurity. Maize is the most important cereal after rice and its production contributes immensely to food availability on the tables of many Nigerians. Maize grains constitute primary source of food for large percentage of the Nigerian populace, thus a considerable waste of this valuable food pre and post-harvest constitutes such a major agricultural bottleneck; that the reduction of pre and post-harvest losses is now a common food security strategy. In surveys conducted, as much as 60% maize outputs can be lost on the field and during the storage stage due to technical inefficiency. Field losses due to rodent damage alone can account for between 10% - 60% grain losses depending on the location. While the use of scientific storage methods can reduce losses below 2% in storage, timely harvesting of crop can check losses on the fields resulting from rodent damage or pest infestation. A push for increased crop production must be complemented by available and affordable post-harvest technologies that will reduce losses on farmers’ fields as well as in storage.Keywords: government policy, maize, population increase, storage, sustainable food production, yield, yield losses
Procedia PDF Downloads 1362871 Supergrid Modeling and Operation and Control of Multi Terminal DC Grids for the Deployment of a Meshed HVDC Grid in South Asia
Authors: Farhan Beg, Raymond Moberly
Abstract:
The Indian subcontinent is facing a massive challenge with regards to energy security in member countries, to provide reliable electricity to facilitate development across various sectors of the economy and consequently achieve the developmental targets. The instability of the current precarious situation is observable in the frequent system failures and blackouts. The deployment of interconnected electricity ‘Supergrid’ designed to carry huge quanta of power across the Indian sub-continent is proposed in this paper. Besides enabling energy security in the subcontinent, it will also provide a platform for Renewable Energy Sources (RES) integration. This paper assesses the need and conditions for a Supergrid deployment and consequently proposes a meshed topology based on Voltage Source High Voltage Direct Current (VSC-HVDC) converters for the Supergrid modeling. Various control schemes for the control of voltage and power are utilized for the regulation of the network parameters. A 3 terminal Multi Terminal Direct Current (MTDC) network is used for the simulations.Keywords: super grid, wind and solar energy, high voltage direct current, electricity management, load flow analysis
Procedia PDF Downloads 4282870 Export and Import Indicators of Georgian Agri-food Products during the Pandemic: Challenges and Opportunities
Authors: Eteri Kharaishvili
Abstract:
Introduction. The paper analyzes the main indicators of export and import of Georgian agri-food products; identifies positive and negative trends under the pandemic; based on the revealed problemssubstantiates the need formodernization ofin agri-food sector. It is argued that low production and productivity rates of food products negatively impact achieving the optimal export-to-import ratio; therefore, it leads toincreaseddependence on other countries andreduces the level of food security. Research objectives. The objective of the research is to identify the key challenges based on the analysis of export-import indicators of Georgian food products during the pandemic period and develop recommendations on the possibilities of post-pandemic perspectives. Research methods. Various theoretical and methodological research tools are used in the paper; in particular, a desk research is carried out on the research topic; endogenous and exogenous variables affecting export and import are determined through factor analysis; SWOT and PESTEL analysis are used to identify development opportunities; selection and groupingof data, identification of similarities and differences is carried outby using analysis, synthesis, sampling, induction and other methods; a qualitative study is conducted based on a survey of agri-food experts and exporters for clarifying the factors that impede export-import flows. Contributions. The factors that impede the export of Georgian agri-food products in the short run under COVID-19 pandemic are identified. These are: reduced income of farmers, delays in the supply of raw materials and supplies to the agri-food sectorfrom the neighboring industries, as well as in harvesting, processing, marketing, transportation, and other sectors; increased indirect costs, etc. The factors that impede the export in the long run areas follows loss of public confidence in the industry, risk of losing positions in traditional markets, etc. Conclusions are made on the problems in the field of export and import of Georgian agri-food products in terms of the pandemic; development opportunities are evaluated based on the analysis of the agri-food sector potential. Recommendations on the development opportunities for export and import of Georgian agri-food products in the post-pandemic period are proposed.Keywords: agri-food products, export, and import, pandemic period, hindering factor, development potential
Procedia PDF Downloads 1422869 Geospatial Modeling Framework for Enhancing Urban Roadway Intersection Safety
Authors: Neeti Nayak, Khalid Duri
Abstract:
Despite the many advances made in transportation planning, the number of injuries and fatalities in the United States which involve motorized vehicles near intersections remain largely unchanged year over year. Data from the National Highway Traffic Safety Administration for 2018 indicates accidents involving motorized vehicles at traffic intersections accounted for 8,245 deaths and 914,811 injuries. Furthermore, collisions involving pedal cyclists killed 861 people (38% at intersections) and injured 46,295 (68% at intersections), while accidents involving pedestrians claimed 6,247 lives (25% at intersections) and injured 71,887 (56% at intersections)- the highest tallies registered in nearly 20 years. Some of the causes attributed to the rising number of accidents relate to increasing populations and the associated changes in land and traffic usage patterns, insufficient visibility conditions, and inadequate applications of traffic controls. Intersections that were initially designed with a particular land use pattern in mind may be rendered obsolete by subsequent developments. Many accidents involving pedestrians are accounted for by locations which should have been designed for safe crosswalks. Conventional solutions for evaluating intersection safety often require costly deployment of engineering surveys and analysis, which limit the capacity of resource-constrained administrations to satisfy their community’s needs for safe roadways adequately, effectively relegating mitigation efforts for high-risk areas to post-incident responses. This paper demonstrates how geospatial technology can identify high-risk locations and evaluate the viability of specific intersection management techniques. GIS is used to simulate relevant real-world conditions- the presence of traffic controls, zoning records, locations of interest for human activity, design speed of roadways, topographic details and immovable structures. The proposed methodology provides a low-cost mechanism for empowering urban planners to reduce the risks of accidents using 2-dimensional data representing multi-modal street networks, parcels, crosswalks and demographic information alongside 3-dimensional models of buildings, elevation, slope and aspect surfaces to evaluate visibility and lighting conditions and estimate probabilities for jaywalking and risks posed by blind or uncontrolled intersections. The proposed tools were developed using sample areas of Southern California, but the model will scale to other cities which conform to similar transportation standards given the availability of relevant GIS data.Keywords: crosswalks, cyclist safety, geotechnology, GIS, intersection safety, pedestrian safety, roadway safety, transportation planning, urban design
Procedia PDF Downloads 1092868 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism
Authors: Nila Febri Wilujeng, Helda Risman
Abstract:
Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange
Procedia PDF Downloads 2092867 Blockchain for IoT Security and Privacy in Healthcare Sector
Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab
Abstract:
The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data
Procedia PDF Downloads 1802866 Changing from Crude (Rudimentary) to Modern Method of Cassava Processing in the Ngwo Village of Njikwa Sub Division of North West Region of Cameroon
Authors: Loveline Ambo Angwah
Abstract:
The processing of cassava from tubers or roots into food using crude and rudimentary method (hand peeling, grating, frying and to sun drying) is a very cumbersome and difficult process. The crude methods are time consuming and labour intensive. While on the other hand, modern processing method, that is using machines to perform the various processes as washing, peeling, grinding, oven drying, fermentation and frying is easier, less time consuming, and less labour intensive. Rudimentarily, cassava roots are processed into numerous products and utilized in various ways according to local customs and preferences. For the people of Ngwo village, cassava is transformed locally into flour or powder form called ‘cumcum’. It is also sucked into water to give a kind of food call ‘water fufu’ and fried to give ‘garri’. The leaves are consumed as vegetables. Added to these, its relative high yields; ability to stay underground after maturity for long periods give cassava considerable advantage as a commodity that is being used by poor rural folks in the community, to fight poverty. It plays a major role in efforts to alleviate the food crisis because of its efficient production of food energy, year-round availability, tolerance to extreme stress conditions, and suitability to present farming and food systems in Africa. Improvement of cassava processing and utilization techniques would greatly increase labor efficiency, incomes, and living standards of cassava farmers and the rural poor, as well as enhance the-shelf life of products, facilitate their transportation, increase marketing opportunities, and help improve human and livestock nutrition. This paper presents a general overview of crude ways in cassava processing and utilization methods now used by subsistence and small-scale farmers in Ngwo village of the North West region in Cameroon, and examine the opportunities of improving processing technologies. Cassava needs processing because the roots cannot be stored for long because they rot within 3-4 days of harvest. They are bulky with about 70% moisture content, and therefore transportation of the tubers to markets is difficult and expensive. The roots and leaves contain varying amounts of cyanide which is toxic to humans and animals, while the raw cassava roots and uncooked leaves are not palatable. Therefore, cassava must be processed into various forms in order to increase the shelf life of the products, facilitate transportation and marketing, reduce cyanide content and improve palatability.Keywords: cassava roots, crude ways, food system, poverty
Procedia PDF Downloads 1662865 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco
Authors: Karima Djebaili, Lamine Melkemi
Abstract:
Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting
Procedia PDF Downloads 4512864 Solar-Plasma Reactors for a Zero-Emission Economy
Authors: Dassou Nagassou
Abstract:
Recent increase in frequency and severity of climatic impacts throughout the world has put a particular emphasis on the urgency to address the anthropogenic greenhouse gas emissions. The latter, mainly composed of carbon dioxide are responsible for the global warming of planet earth. Despite efforts to transition towards a zero-emission economy, manufacturing industries, electricity generation power plants, and transportation sectors continue to encounter challenges which hinder their progress towards a full decarbonization. The growing energy demand from both developed and under-developed economies exacerbates the situation and as a result, more carbon dioxide is discharged into the atmosphere. This situation imposes a lot of constraints on industries which are involved i.e., manufacturing industries, transportation, and electricity generation which must navigate the stringent environmental regulations in order to remain profitable. Existing solutions such as energy efficiencies, green materials (life cycle analysis), and many more have fallen short to address the problem due to their inadaptation to existing infrastructures, low efficiencies, and prohibitive costs. The proposed technology exploits the synergistic interaction between solar radiation and plasma to boost a direct decomposition of the molecules of carbon dioxide while producing alternative fuels which can be used to sustain on-site high-temperature processes via 100% solar energy harvesting in the form of photons and electricity. The advantages of this technology and its ability to be easily integrated into existing systems make it appealing for the industry which can now afford to fast track on the path towards full decarbonization, thanks to the solar plasma reactor. Despite the promising experimental results which proved the viability of this concept, solar-plasma reactors require further investigations to understand the synergistic interactions between plasma and solar radiation for a potential technology scale-up.Keywords: solar, non-equilibrium, plasma, reactor, greenhouse-gases, solar-fuels
Procedia PDF Downloads 582863 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 1312862 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation
Authors: Aditi Chauhan, Neethu S. Mohan
Abstract:
In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.Keywords: documents, identity, computational system, suspect
Procedia PDF Downloads 1762861 Standard Resource Parameter Based Trust Model in Cloud Computing
Authors: Shyamlal Kumawat
Abstract:
Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.Keywords: cloud, Iaas, Saas, Paas
Procedia PDF Downloads 3302860 Climate Change Impact on Slope Stability: A Study of Slope Drainage Design and Operation
Authors: Elena Mugarza, Stephanie Glendinning, Ross Stirling, Colin Davies
Abstract:
The effects of climate change and increased rainfall events on UK-based infrastructure are observable, with an increasing number being reported on in the national press. The fatal derailment at Stonehaven in 2020 prompted a wider review of Network Rail-owned earthworks assets. The event was indicated by the Rail Accident Investigation Branch (RAIB) to be caused by mis-installed drainage on the adjacent cutting. The slope failure on Snake Pass (public highway A57) was reportedly caused by significant water ingress following numerous storm events and resulted in the road’s closure for several months. This problem is only projected to continue with greater intensity and more prolonged rainfall events forecasted in the future. Subsequently, this project is designed to evaluate effective drainage trench design within infrastructure embankments, considering the capillary barrier phenomenon that may govern their deterioration and resultant failure. Theoretically, the differential between grain sizes of the embankment clays and gravels, customarily used in drainage trenches, would have a limiting effect on infiltration. As such, it is anticipated that the inclusion of an additional material with an intermediate grain size should improve the hydraulic conductivity across the drainage boundary. Multiple drainage designs will be studied using instrumentation within the drain and surrounding clays. Data from the real-world installation at the BIONICS embankment will be collected and compared with laboratory and Finite Element (FE) simulations. This research aims to reduce the risk of infrastructure slope failures by improving the resilience of earthwork drainage and lessening the consequential impact on transportation networks.Keywords: earthworks, slope drainage, transportation slopes, deterioration, capillary barriers, field study
Procedia PDF Downloads 512859 The Promoting of Early Childhood Development in Local Government Child Center
Authors: Vorapoj Promasatayaprot, Sumattana Glangkarn
Abstract:
Background: Early childhood, the first five years of life, is a time of rapid cognitive, linguistic, social, emotional and motor development. This study was descriptive research which the main purpose of this research was to study early childhood development in Child Center of Local Government in order to emphasize the public citizen and communities participate in the Child Development Center. Method: The study designed was Action Research and divided into four steps consisted of (1) Planning (2) Acting (3) Observing and (4) Reflecting. This study was employed the areas and the subjects consisted of 10 committees of the Child Center in Thakhonyang municipality, Kantharawichai District, Maha Sarakham Province, Thailand and 50 representative parents by using the purposive sampling technique. The instrument used in this study were questionnaires. The data were analyzed using descriptive statistic; percentage, mean, standard deviation, maximum value, minimum, median. Qualitative data was collected using the observation and interview and was analysed by content analysis. Results: The results of this research were as follows: The promoting of early childhood development in child center at Thakhonyang Municipality, Kantharawichai District, Maha Sarakham Province, Thailand were 6 procedures ; (1) workshop participation (2) workshop in action plan (3) performing in action plan (4) following supervision (5) self – assessment (6) knowledge sharing seminar. The service model of the Local Fund Health Security in Thailand was passed the qualifications of local fund health security by 6 procedures to be the high potential local fund health security. Conclusion: The key success is that the commission will have to respond the performance at all process of plan to address the issue in the future. Factor of success is to community participate with transparent procedure. Coordination committee should manipulate the child center benefits among stake holders.Keywords: child center, develop, early childhood development, local government, promote
Procedia PDF Downloads 1932858 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 354