Search results for: IoT security architecture
3048 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1103047 Bulk Amounts of Linear and Cyclic Polypeptides on Our Hand within a Short Time
Abstract:
Polypeptides with defined peptide sequences illustrate the power of remarkable applications in drug delivery, tissue engineering, sensing and catalysis. Especially the cyclic polypeptides, the distinctive topological architecture imparts many characteristic properties comparing to linear polypeptides. Here, a facile and highly efficient strategy for the synthesis of linear and cyclic polypeptides is reported using N-heterocyclic carbenes (NHCs)-mediated ring-opening polymerization (ROP) of α-amino acid N-carboxyanhydrides (NCA) in the presence or absence of primary amine initiator. The polymerization proceeds rapidly in a quasi-living manner, allowing access to linear and cyclic polypeptides of well-defined chain length and narrow polydispersity, as evidenced by nuclear magnetic resonance spectrum (1H NMR and 13C NMR spectra) and size exclusion chromatography (SEC) analysis. The cyclic architecture of the polypeptides was further verified by matrix-assisted laser desorption ionization-time of flight (MALDI-TOF) mass spectra (MALDI-TOF MS) and electrospray ionization (ESI) mass spectra, as well as viscosity studies. This approach can also simplify workup procedures and make bulk scale synthesis possible, which thereby opens avenues for practical uses in diverse areas, opening up the new generation of polypeptide synthesis.Keywords: α-amino acid N-carboxyanhydrides, living polymerization, polypeptides, N-heterocyclic carbenes, ring-opening polymerization
Procedia PDF Downloads 1663046 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 133045 Histological Evaluation of the Neuroprotective Roles of Trans Cinnamaldehyde against High Fat Diet and Streptozotozin Induced Neurodegeneration in Wistar Rats
Authors: Samson Ehindero, Oluwole Akinola
Abstract:
Substantial evidence has shown an association between type 2 diabetes (T2D) and cognitive decline, Trans Cinnamaldehyde (TCA) has been shown to have many potent pharmacological properties. In this present study, we are currently investigating the effects of TCA on type II diabetes-induced neurodegeneration. Neurodegeneration was induced in forty (40) adult wistar rats using high fat diet (HFD) for 4 months followed by low dose of streptozotocin (STZ) (40 mg/kg, i.p.) administration. TCA was administered orally for 30 days at the doses of 40mg/kg and 60mg/kg body weight. Animals were randomized and divided into following groups; A- control group, B- diabetic group, C- TCA (high dose), D- diabetic + TCA (high dose), E- diabetic + TCA (high dose) with high fat diet, F- TCA Low dose, G- diabetic + TCA (low dose) and H- diabetic + TCA (low dose) with high fat diet. Animals were subjected to behavioral tests followed by histological studies of the hippocampus. Demented rats showed impaired behavior in Y- Maze test compared to treated and control groups. Trans Cinnamaldehyde restores the histo architecture of the hippocampus of demented rats. This present study demonstrates that treatment with trans- cinnamaldehyde improves behavioral deficits, restores cellular histo architecture in rat models of neurodegeneration.Keywords: neurodegeneration, trans cinnamaldehyde, high fat diet, streptozotocin
Procedia PDF Downloads 1833044 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1543043 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking
Authors: Haowei Chen, Kaiqi Xiong
Abstract:
This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis
Procedia PDF Downloads 983042 Factors Affecting Sense of Community in Residential Communities Case Study: Residential Communities in Tehran, Iran
Authors: Parvin Foroughifar
Abstract:
The concept of sense of community refers to residents’ sense of attachment and commitment to the other residents in a residential community. It is implicitly indicative of the mental image of a physical environment in which the residents enjoy strong social ties. Sense of community, a crucial factor in improving quality of life and social welfare, leads to life satisfaction in a residential community. Despite the important functions of such a notion, few empirical studies, to the best of the authors' knowledge, have been so far carried out in Iran to investigate the effective factors in sharpening the sense of community in residential communities. This survey research examined sense of community in 360 above 20-year old residents of three residential communities in Tehran, Iran using cluster sampling and questionnaire. The study yielded the result that variables of local social ties, social control and trust, sense of security, length of residence, use of public spaces, and mixed land use have a significant relationship with sense of community.Keywords: sense of community, local social ties, sense of security, public space, residential community, Tehran
Procedia PDF Downloads 1873041 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 3903040 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 1443039 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 1623038 Challenges to Collaborative Learning in Architectural Education in the Middle East
Authors: Lizmol Mathew, Divya Thomas, Shiney Rajan
Abstract:
Educational paradigm all over the globe is undergoing significant reform today. Because of this, so-called flipped classroom model is becoming increasingly popular in higher education. Flipped classroom has proved to be more effective than traditional lecture based model as flipped classroom model promotes active learning by encouraging students to work on in collaborative tasks and peer-led learning during the class-time. However, success of flipped classrooms relies on students’ ability and their attitudes towards collaboration and group work. This paper examines: 1) Students’ attitudes towards collaborative learning; 2) Main challenges to successful collaboration from students’ experience and 3) Students’ perception of criteria for successful team work. 4) Recommendations for enhancing collaborative learning. This study’s methodology involves quantitative analysis of surveys collected from students enrolled in undergraduate Architecture program at Qatar University. Analysis indicates that in general students enrolled in the program do not have positive perceptions or experiences associated with group work. Positive and negative factors that influence collaborative learning in higher education have been identified. Recommendations for improving collaborative work experience have been proposed.Keywords: architecture, collaborative learning, female, group work, higher education, Middle East, Qatar, student experience
Procedia PDF Downloads 3283037 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 1383036 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks
Authors: C. N. Vanitha, M. Usha
Abstract:
In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.Keywords: neural networks, pattern learning, security, wireless sensor networks
Procedia PDF Downloads 4043035 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 3023034 Measuring Learning Independence and Transition through the First Year in Architecture
Authors: Duaa Al Maani, Andrew Roberts
Abstract:
Students in higher education are expected to learn actively and independently. Whilst quite work has been done to understand the perceptions of students’ learning transition regarding independent learning, to author’s best knowledge, it seems relatively few published research on independent learning in studio-based subjects such as architecture. Another major issue in independent learning research concerned the inconsistency in terminology; there appears to be a paucity of research on its definition, challenges, and tools within the UK university sector. It is not always clear how independent learning works in practice, or what are the challenges that face students toward being independent learners. Accordingly, this paper seeks to highlight these problems by analyzing previous and current literature of independent learning, in addition, to measure students’ independence at the very begging of their first academic year and compare it with their level of learning independence at the end of the same year. Eighty-seven student enrolled in 2017/2018 at Cardiff University completed the Autonomous Learning Questionnaire in order to measure their level of learning independence. Students’ initial responses were very positive and showed high level of learning independence. Interestingly, these responses significantly decreased at the end of the year. Time management was the most obvious challenge facing students transition into higher education, and contrary to expectations, we found no effect of student maturity on their level of independence. Moreover, we found no significant differences among students’ gender, but we did find differences among nationalities.Keywords: autonomous learning, first year, learning independence, transition
Procedia PDF Downloads 1453033 Adaptive Architecture and Urbanism - A Study of Coastal Cities, Climate Change Problems, Effects, Risks And Opportunities for Making Sustainable Habitat
Authors: Santosh Kumar Ketham
Abstract:
Climate change creating most dramatic and destructive consequences, the result is global warming and sea-level rise, flooding coastal cities around the world forming vulnerable situations affecting in multiple ways: environment, economy, social and political. The aim and goal of the research is to develop cities on water. Taking the problem as an opportunity to bring science, engineering, policies and design together to make a resilient and sustainable floating community on water considering existing/new technologies of floating. The quest is to make sustainable habitat on water to live, work, learn and play. To make sustainable energy generation and storage alongside maintaining balance of land and marine to conserve Ecosystem. The research would serve as a model for sustainable neighbourhoods designed in a modular way and thus can easily extend or re-arranged, to adapt for future socioeconomic realities. This research paper studies primarily on climate change problems, effects, risks and opportunities. It does so, through analysing existing case studies, books and writings published on coastal cities and understanding its various aspects for making sustainable habitat.Keywords: floating cities, flexible modular typologies, rising sea levels, sustainable architecture and urbanism
Procedia PDF Downloads 1353032 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 3223031 Autonomous Taxiing Robot for Grid Resilience Enhancement in Green Airport
Authors: Adedayo Ajayi, Patrick Luk, Liyun Lao
Abstract:
This paper studies the supportive needs for the electrical infrastructure of the green airport. In particular, the core objective revolves around the choice of electric grid configuration required to meet the expected electrified loads, i.e., the taxiing and charging loads of hybrid /pure electric aircraft in the airport. Further, reliability and resilience are critical aspects of a newly proposed grid; the concept of mobile energy storage as energy as a service (EAAS) for grid support in the proposed green airport is investigated using an autonomous electric taxiing robot (A-ETR) at a case study (Cranfield Airport). The performance of the model is verified and validated through DigSILENT power factory simulation software to compare the networks in terms of power quality, short circuit fault levels, system voltage profile, and power losses. Contingency and reliability index analysis are further carried out to show the potential of EAAS on the grid. The results demonstrate that the low voltage a.c network ( LVAC) architecture gives better performance with adequate compensation than the low voltage d.c (LVDC) microgrid architecture for future green airport electrification integration. And A-ETR can deliver energy as a service (EaaS) to improve the airport's electrical power system resilience and energy supply.Keywords: reliability, voltage profile, flightpath 2050, green airport
Procedia PDF Downloads 813030 The Ancient Oasis Architecture of Ghadames
Authors: Amer Rghei
Abstract:
The Sahara region potentially is one of the most attractive heritage areas in the world. Yet presently, the heritage of the Sahara is currently facing serious planning challenges of underdeveloped and neglected economic and physical potentials. Deterioration of heritage resources has been observed by the author during his several field tours for historic sites has discovered special heritage values such as in Ghadames which combines historic oasis, natural environment along with its exceptional urban fabric and architectural character. Despite the richness of Ghadames with historic significance, it is found that at the present time, Ghadames city, the UNESCO World Heritage site, is facing serious challenges including the abandonment by its tenants and inclusive negligence by its officials. The author believes that Ghadames can illustrate an excellent heritage example in North Africa with cultural pride and socio-economic opportunities that can contribute to overall economic development in the Sahara region. However, the paper deals with the case of Ghadames ‘The World Heritage Site’ in Libya and discusses the current challenges and possible planning for its heritage conservation strategy. The momentous resources in Ghadames with their historical, environmental, economic, social, cultural, and aesthetic values would benefit from a careful heritage planning and management program for its significant values. In this paper an attempt is made to investigate this issue seriously towards building a model of a strategy for heritage conservation planning for Ghadames is proposed.Keywords: Ghadames, Oasis architecture, Sahara region, heritage environment
Procedia PDF Downloads 2953029 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration
Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu
Abstract:
This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.Keywords: migration, border, security, memory effect
Procedia PDF Downloads 913028 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2483027 Metamorphic Approach in Architecture Studio to Re-Imagine Drawings in Acknowledgement of Architectural/Artistic Identity
Authors: Hassan Wajid, Syed T. Ahmed, Syed G. Haider Jr., Razia Latif, Ahsan Ali, Maira Anam
Abstract:
The phenomenon of Metamorphosis can be associated with any object, organism, or structure gradually and progressively going through the change of systemic or morphological form. This phenomenon can be integrated while teaching drawing to architecture students. In architectural drawings, metamorphosis’s main focus and purpose are not to completely imitate any object. In the process of drawing, the changes in systemic or morphological form happen until the complete process, and the visuals of the complete process change the drawing, opening up possibilities for the imagination of the perceivers. Metamorphosis in architectural drawings begins with an initial form and, through various noticeable stages, ends up final form or manifestation. How much of the initial form is manifested in the final form and progressively among various intermediate stages becomes an indication of the nature of metamorphosis as a phenomenon. It is important at this stage to clarify that the term metamorphosis is presently being coopted from its original domain, usually in life sciences. In this current exercise, the architectural drawings are to act as an operative analog process transforming one image of art and/or architecture in its broadest sense. That composition is claimed to have come from one source (individual work, a cultural artifact, civilizational remain). It dialectically meets, opposes, or confronts some carefully chosen alien opposites from a different domain. As an example, the layers of a detailed drawing of a Turkish prayer rug of 5 x 7 ratio over a detailed architectural plan of a religious, historical complex can be observed such that the two drawings, though at markedly different scales could dialectically converse with one another and through their mutual congruencies. In the final stage, the idea concludes contradictions across the scales to initiate the analogous roles of metamorphosed third reality, which suggests the previous un-acknowledged architectural or artistic identity. The proposed paper explores the trajectory of reproduction by analyzing drawings through detailed drawing stages and analyzes challenges as well as opportunities in the discovered realm of imagination. This description further aims at identifying factors influencing creativity and innovation in producing architectural drawings through the process of observing drawings from inception to the concluding stage.Keywords: architectural drawings, metamorphosis, perceptions, discovery
Procedia PDF Downloads 1043026 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 3243025 Evolution of Design through Documentation of Architecture Design Processes
Authors: Maniyarasan Rajendran
Abstract:
Every design has a process, and every architect deals in the ways best known to them. The design translation from the concept to completion change in accordance with their design philosophies, their tools, availability of resources, and at times the clients and the context of the design as well. The approach to understanding the design process requires formalisation of the design intents. The design process is characterised by change, with the time and the technology. The design flow is just indicative and never exhaustive. The knowledge and experience of stakeholders remain limited to the part they played in the project, and their ability to remember, and is through the Photographs. These artefacts, when circulated can hardly tell what the project is. They can never tell the narrative behind. In due course, the design processes are lost. The Design junctions are lost in the journey. Photographs acted as major source materials, along with its importance in architectural revivalism in the 19th century. From the history, we understand that it has been photographs, that act as the dominant source of evidence. The idea of recording is also followed with the idea of getting inspired from the records and documents. The design concept, the architectural firms’ philosophies, the materials used, the special needs, the numerous ‘Trial-and-error’ methods, design methodology, experience of failures and success levels, and the knowledge acquired, etc., and the various other aspects and methods go through in every project, and they deserve/ought to be recorded. The knowledge can be preserved and passed through generations, by documenting the design processes involved. This paper explores the idea of a process documentation as a tool of self-reflection, creation of architectural firm’ repository, and these implications proceed with the design evolution of the team.Keywords: architecture, design, documentation, records
Procedia PDF Downloads 3683024 Traditional and New Residential Architecture in the Approach of Sustainability in the Countryside after the Earthquake
Authors: Zeynep Tanriverdi̇
Abstract:
Sustainable architecture is a design approach that provides healthy, comfortable, safe, clean space production as well as utilizes minimum resources for efficient and economical use of natural resources and energy. Traditional houses located in rural areas are sustainable structures built at the design and implementation stage in accordance with the climatic environmental data of the region and also effectively using natural energy resources. The fact that these structures are located in an earthquake geography like Türkiye brings their earthquake resistance to the agenda. Since the construction of these structures, which contain the architectural and technological cultural knowledge of the past, is shaped according to the characteristics of the regions where they are located, their resistance to earthquakes also differs. Analyses in rural areas after the earthquake show that there are light-damaged structures that can survive, severely damaged structures, and completely destroyed structures. In this regard, experts can implement repair, consolidation, and reconstruction applications, respectively. While simple repair interventions are carried out in accordance with the original data in traditional houses that have shown great resistance to earthquakes, reinforcement work blended with new technologies can be applied in damaged structures. In reconstruction work, a wide variety of applications can be seen with the possibilities of modern technologies. In rural areas experiencing earthquakes around the world, there are experimental new housing applications that are renewable, environmentally friendly, and sustainable with modern construction techniques in the light of scientific data. With these new residences, it is aimed to create earthquake-resistant, economical, healthy, and pain-relieving therapy spaces for people whose daily lives have been interrupted by disasters. In this study, the preservation of high earthquake-prone rural areas will be discussed through the knowledge transfer of traditional architecture and also permanent housing practices using new sustainable technologies to improve the area. In this way, it will be possible to keep losses to a minimum with sustainable, reliable applications prepared for the worst aspects of the disaster situation and to establish a link between the knowledge of the past and the new technologies of the future.Keywords: sustainability, conservation, traditional construction systems and materials, new technologies, earthquake resistance
Procedia PDF Downloads 633023 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 2993022 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 4853021 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1443020 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria
Authors: Aishatu Shuaibu
Abstract:
It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria
Procedia PDF Downloads 183019 Co-Designing Health as a Social Community Centre: The Case of a 'Doctors of the World Project' in Brussels
Authors: Marco Ranzato, Maguelone Vignes
Abstract:
The co-design process recently run by the trans-disciplinary urban laboratory Metrolab Brussels for outlining the architecture of a future integrated health centre in Brussels (Belgium) has highlighted that a buffer place open to the local community is the appropriate cornerstone around which organizing a space where diverse professionals and patients are together. In the context of the migrants 'crisis' in Europe, the growing number of vulnerable people in Brussels and the increasing complexity of the health and welfare systems, the NGO Doctors of the World (DoW) has launched a project funded by The European Regional Development Fund, and aiming to create a new community centre combining social and health services in a poor but changing neighborhood of Brussels. Willing not to make a 'ghetto' of this new integrated service, the NGO looks at hosting different publics in order to make the poorest, marginal and most vulnerable people access to a regular kind of service. As a trans-disciplinary urban research group, Metrolab has been involved in the process of co-designing the architecture of the future centre with a set of various health professionals, social workers, and patients’ representatives. Metrolab drawn on the participants’ practice experiences and knowledge of hosting different kinds of publics and professions in a same structure in order to imagine what rooms should fit into the centre, what atmosphere they should convey, how should they be interrelated and organized, and, concurrently, how the building should fit into the urban frame of its neighborhood. The result is that, in order for an integrated health centre framed in the landscape of a disadvantaged neighborhood to function, it has to work as social community centre offering accessibility and conviviality to diverse social groups. This paper outlines the methodology that Metrolab used to design and conduct, in close collaboration with DoW, a series of 3 workshops. Through sketching and paper modeling, the methodology made participants talk about their experience by projecting them into a situation. It included a combination of individual and collective work in order to sharp participants’ eyes on architectural forms, explicit their thoughts and experience through inter-subjectivity and imagine solutions to the challenges they raised. Such a collaborative method encompasses several challenges about patients’ participation and representation, replicability of the conditions of success and the plurality of the research findings communication formats. This paper underlines how this participatory process has contributed to build knowledge on the few-documented topic of the architecture of community health centres. More importantly, the contribution builds on this participatory process to discuss the importance of adapting the architecture of the new integrated health centre to the changing population of Brussels and to the issues of its specific neighborhood.Keywords: co-design, health, social innovation, urban lab
Procedia PDF Downloads 171