Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6006

Search results for: security service

4296 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education

Authors: Mohammed A. M. Ibrahim

Abstract:

This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.

Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption

Procedia PDF Downloads 319
4295 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 121
4294 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan

Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam

Abstract:

Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.

Keywords: climate change, crop insurance, heatwave, wheat yield punjab

Procedia PDF Downloads 63
4293 South Africa and U.S. AFRICOM: Reflections on a Lukewarm Relationship

Authors: Theo Neethling

Abstract:

The United States Africa Command (AFRICOM) was established in 2007 as a military and diplomatic entity and is intended to assist African states and military actors to address their security needs. At the same time, AFRICOM is clearly an extension of US strategic interests on the African continent. The challenge for the US Department of Defence is to project AFRICOM as a cooperative and willing partner. This implies a partner that offers needed services and resources, and supports African security and military priorities with no presumption of having a privileged role in defining the African future. However, one of AFRICOM’s main challenges relates to the point that it has not been able to secure a firm partnership with South Africa as a key player on the continent: South Africa has continuously taken a lukewarm, if not cold, approach towards AFRICOM since its formation. The main aim of this article is to examine and discuss South Africa’s political-military relations with AFRICOM and to assess the underlying reasons currently inhibiting AFRICOM from achieving a fully productive relationship with the South African government.

Keywords: AFRICOM, South African foreign policy, US interests, defence capabilities in Africa, US-Africa relations

Procedia PDF Downloads 278
4292 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 139
4291 Relationship between Mental Health and Food Access among Healthcare College Students in a Snowy Area in Japan

Authors: Yuki Irie, Shota Ogawa, Hitomi Kosugi, Hiromitsu Shinozaki

Abstract:

Background: Dropout from higher educational institutions is a major problem both for students and institutions, and poor mental health is one of the risk factors. Medical college students are at higher risk of poor mental health than general students because of their hard academic schedules. On the other hand, food insecurity has negative impacts on mental health. The healthcare college of the project site is located heavily snowy area. The students without own vehicles may be at higher risk of food insecurity, especially in the winter season. Therefore, they have many risks to mental health. The aim of the study is to clarify the relationship between mental health and its risk factors to promote students’ mental well-being. Method: A cross-sectional design was used to investigate the relationship between mental health status and lifestyle, including diet and food security among the students (n=421, 147 male, 274 females; 20.7 ± 2.8 years old). Participants were required to answer 3 questionnaires which consisted of diet, lifestyle, food security, and mental health. The survey was conducted during the snowy season from Dec. 2022 to Jan. 2023. Results: Mean mental score was 6.7±4.6 (max. score 27, a higher score means worse mental health). Significant risk factors in mental health were breakfast habit (p=0.02), subjective dietary habit (p=0.00), subjective health (p=0.00), exercise habit (p=0.02), food insecurity in the winter season (p=0.01), and vitamin A intakes (p=0.03). Conclusions: Nutrients intakes are not associated with mental health except vitamin A; however, some other lifestyle factors are significantly associated with mental health. Nutrition doesn’t lead to poor mental health directly; however, the promotion of a healthy lifestyle and improved food security in winter may be effective in better mental health.

Keywords: mental health, winter, lifestyle, students

Procedia PDF Downloads 67
4290 Prevalence and Factors Associated to Work Accidents in the Construction Sector in Benin: Cases of CFIR – Consulting

Authors: Antoine Vikkey Hinson, Menonli Adjobimey, Gemayel Ahmed Biokou, Rose Mikponhoue

Abstract:

Introduction: Construction industry is a critical concern with regard to Health and Safety Service worldwide. World health Organization revealed that work-related disease and trauma were held responsible for the death of one million nine hundred thousand people in 2016. The aim of this study it was to determine the prevalence and factors associated with the occurrence of work accidents in a construction industry in Benin. Method: It was a descriptive cross-sectional and analytical study. Data analysis was performed with R software 4.1.1. In multivariate analysis, we performed a binary logistic regression. OR adjusted (ORa) association measures and their 95% confidence interval [CI95%] were presented for the explanatory variables used in the final model. The significance threshold for all tests selected was 5% (p < 0.05) Result: In this study, 472 workers were included, and, of these, 452 (95.7%) were men corresponding to a sex ratio of 22.6. The average age of the workers was 33 years ± 8.8 years. Workers were mostly laborers (84.7%), and had declared having inadequate personal protective equipment (50.6%, n=239). The prevalence of work accidents is 50.8%. Collision with a rolling stock (25.8%), cut (16.2%), and stumbling (16.2%) were the main types of work accidents on the construction site. Four factors were associated with contributing to work accidents. Fatigue or exhaustion (ORa : 1.53[1.03 ; 2.28]); The use of dangerous tools (ORa : 1.81 [1.22 ; 2.71]); The various laborers’ jobs (ORa : 4.78 [2.62 ; 9.21]); and seniority in the company ≥ 4 years (ORa : 2.00 [1.35 ; 2.96]). Conclusion: This study allowed us to identify the associated factors. It is imperative to implement a rigorous policy of occupational health and security mostly the continuing training for workers safe, the supply of appropriate work tools and protective

Keywords: prevalence, work accident, associated factors, construction, benin

Procedia PDF Downloads 35
4289 Bahrain Experience in Supporting Small and Medium Enterprises by the Utilization of E-Government

Authors: Najla Alhkalaf

Abstract:

The focus of this study is answering the following question: How do e-government services in Bahrain support the productivity of SMEs? This study examines the current E-government function in enhancing SME productivity in Bahrain through analysing the efficiency of e- government by viewing its facilitators and barriers from the perspective of different stakeholders. The study aims to identify and develop best practice guidelines with the end-goal of creating a standardised channel of communication between e-government and SMEs that fulfil the requirement of SME owners, and thus achieve the prime objective of e-government. E-government services for SMEs have been offered in Bahrain since 2005. However, the current services lack the required mechanism for SMEs to fully take advantage of these services because of lagging communication between service provider and end-user. E-government employees believe that a lack of awareness and trust are the main stumbling block, whereas the SME owners believe that there is a lack of sufficiency in the content and efficiency provided through e- services. A questionnaire has been created based on a pilot study that highlighted the main indicators of e-government efficiency and SMEs productivity as well as previous studies conducted on this subject. This allowed for quantitative data to be extracted. Also interviews were conducted with SME owners and government employees from both case studies, which formed the qualitative data for this study. The findings portray that both the service provider and service receiver largely agree on the existence of most of the technical and administrative barriers. However, the data reflects a level of dissatisfaction from the SME side, which contradicts with the perceived level of satisfaction from the government employees. Therefore, the data supports the argument that assures the existence of a communication gap between stakeholders. To this effect, this research would help build channels of communication between stakeholders, and then induces a plan unlocking the potential of e-government application. The conclusions of this study will help devise an optimised E-government strategy for Bahrain.

Keywords: e-government, SME, e-services, G2B, government employees' perspective, entrepreneurs' perspective, enterprise

Procedia PDF Downloads 218
4288 Pallet Tracking and Cost Optimization of the Flow of Goods in Logistics Operations by Serial Shipping Container Code

Authors: Dominika Crnjac Milic, Martina Martinovic, Vladimir Simovic

Abstract:

The case study method in this paper shows the implementation of Information Technology (IT) and the Serial Shipping Container Code (SSCC) in a Croatian company that deals with logistics operations and provides logistics services in the cold chain segment. This company is aware of the sensitivity of the goods entrusted to them by the user of the service, as well as of the importance of speed and accuracy in providing logistics services. To that end, it has implemented and used the latest IT to ensure the highest standard of high-quality logistics services to its customers. Looking for efficiency and optimization of supply chain management, while maintaining a high level of quality of the products that are sold, today's users of outsourced logistics services are open to the implementation of new IT products that ultimately deliver savings. By analysing the positive results and the difficulties that arise when using this technology, we aim to provide an insight into the potential of this approach of the logistics service provider.

Keywords: logistics operations, serial shipping container code, information technology, cost optimization

Procedia PDF Downloads 347
4287 Expectation and Satisfaction of Health Spa Business Service, Ranong Province, Thailand

Authors: Supattra Pranee

Abstract:

The purposes of this research are to study the current business of health spa and to study the customers’ level of expectation as well as level of satisfaction of the health spa business in Ranong, Thailand. This paper drew upon data collected from health spa customers by using questionnaire. In addition, an in-depth interview was utilized to collect data from health spa entrepreneurs. The findings revealed that the health spa business is growing very fast and the coming ASEAN Economic Community (AEC) will ameliorate the business growth and increase the customer base. There is a need to improve staff’s ability to communicate in English. However, the economic size of Ranong province is still small which has resulted in the hesitation of investors to increase their investment in this business. The findings also revealed four categories of level of expectation and satisfaction as follows: (1) Service: overall, customers had a high expectation with a mean of 3.80 and 0.873 SD and a high level of satisfaction with a mean of 3.66 and 0.704 SD. (2) Staff: overall, customers had a high expectation with a mean of 3.95 and 0.865 SD and a high level of satisfaction with a mean of 3.84 and 0.783 SD. (3) Product, Equipment, and Tools: overall, customers had a high expectation with a mean of 4.02 and 0.913 SD and a high level of satisfaction with a mean of 3.88 and 0.772 SD. (4) Place, Atmosphere, and Environment: overall, customers had a high expectation with a mean of 3.95 and 0.906 SD and a high level of satisfaction with a mean of 3.86 and 0.785 SD.

Keywords: expectation, health spa business, satisfaction, ranong province

Procedia PDF Downloads 289
4286 A Structure-Based Approach for Adaptable Building System

Authors: Alireza Taghdiri, Sara Ghanbarzade Ghomi

Abstract:

Existing buildings are permanently subjected to change, continuously renovated and repaired in their long service life. Old buildings are destroyed and their material and components are recycled or reused for constructing new ones. In this process, importance of sustainability principles for building construction is obviously known and great significance must be attached to consumption of resources, resulting effects on the environment and economic costs. Utilization strategies for extending buildings service life and delay in destroying have positive effect on environment protection. In addition, simpler alterability or expandability of buildings’ structures and reducing energy and natural resources consumption have benefits for users, producers and environment. To solve these problems, by applying theories of open building, structural components of some conventional building systems have been analyzed and then, a new geometry adaptive building system is developed which can transform and support different imposed loads. In order to achieve this goal, various research methods and tools such as professional and scientific literatures review, comparative analysis, case study and computer simulation were applied and data interpretation was implemented using descriptive statistics and logical arguments. Therefore, hypothesis and proposed strategies were evaluated and an adaptable and reusable 2-dimensional building system was presented which can respond appropriately to dwellers and end-users needs and provide reusability of structural components of building system in new construction or function. Investigations showed that this incremental building system can be successfully applied in achieving the architectural design objectives and by small modifications on components and joints, it is easy to obtain different and adaptable load-optimized component alternatives for flexible spaces.

Keywords: adaptability, durability, open building, service life, structural building system

Procedia PDF Downloads 555
4285 Smart Irrigation Systems and Website: Based Platform for Farmer Welfare

Authors: Anusha Jain, Santosh Vishwanathan, Praveen K. Gupta, Shwetha S., Kavitha S. N.

Abstract:

Agriculture has a major impact on the Indian economy, with the highest employment ratio than any sector of the country. Currently, most of the traditional agricultural practices and farming methods are manual, which results in farmers not realizing their maximum productivity often due to increasing in labour cost, inefficient use of water sources leading to wastage of water, inadequate soil moisture content, subsequently leading to food insecurity of the country. This research paper aims to solve this problem by developing a full-fledged web application-based platform that has the capacity to associate itself with a Microcontroller-based Automated Irrigation System which schedules the irrigation of crops based on real-time soil moisture content employing soil moisture sensors centric to the crop’s requirements using WSN (Wireless Sensor Networks) and M2M (Machine To Machine Communication) concepts, thus optimizing the use of the available limited water resource, thereby maximizing the crop yield. This robust automated irrigation system provides end-to-end automation of Irrigation of crops at any circumstances such as droughts, irregular rainfall patterns, extreme weather conditions, etc. This platform will also be capable of achieving a nationwide united farming community and ensuring the welfare of farmers. This platform is designed to equip farmers with prerequisite knowledge on tech and the latest farming practices in general. In order to achieve this, the MailChimp mailing service is used through which interested farmers/individuals' email id will be recorded and curated articles on innovations in the world of agriculture will be provided to the farmers via e-mail. In this proposed system, service is enabled on the platform where nearby crop vendors will be able to enter their pickup locations, accepted prices and other relevant information. This will enable farmers to choose their vendors wisely. Along with this, we have created a blogging service that will enable farmers and agricultural enthusiasts to share experiences, helpful knowledge, hardships, etc., with the entire farming community. These are some of the many features that the platform has to offer.

Keywords: WSN (wireless sensor networks), M2M (M/C to M/C communication), automation, irrigation system, sustainability, SAAS (software as a service), soil moisture sensor

Procedia PDF Downloads 107
4284 A Mechanism of Reusable, Portable, and Reliable Script Generator on Android

Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu

Abstract:

A good automated testing tool could reduce as much as possible the manual work done by testers. Traditional record-replay testing tool provides an automated testing solution by recording mouse coordinates as test scripts, but it will be easily broken if any change of resolutions. Therefore, more and more testers design multiple test scripts to automate the testing process for different devices. In order to improve the traditional record-replay approach and reduce the effort that the testers spending on writing test scripts, we propose an approach for generating the Android application test scripts based on accessibility service without connecting to a computer. This approach simulates user input actions and replays them correctly even at the different conditions such as the internet connection is unstable when the device under test, the different resolutions on Android devices. In this paper, we describe how to generate test scripts automatically and make a comparison with existing tools for Android such as Robotium, Appium, UIAutomator, and MonkeyTalk.

Keywords: accessibility service, Appium, automated testing, MonkeyTalk, Robotium, testing, UIAutomator

Procedia PDF Downloads 356
4283 Adaptability of Steel-Framed Industrialized Building System

Authors: Alireza Taghdiri, Sara Ghanbarzade Ghomi

Abstract:

Existing buildings are permanently subjected to change, continuously renovated and repaired in their long service life. Old buildings are destroyed and their material and components are recycled or reused for constructing new ones. In this process, importance of sustainability principles for building construction is obviously known and great significance must be attached to consumption of resources, resulting effects on the environment and economic costs. Utilization strategies for extending buildings service life and delay in destroying have positive effect on environment protection. In addition, simpler alterability or expandability of buildings’ structures and reducing energy and natural resources consumption have benefits for users, producers and environment. To solve these problems, by applying theories of open building, structural components of some conventional building systems have been analyzed and then, a new geometry adaptive building system is developed which can transform and support different imposed loads. In order to achieve this goal, various research methods and tools such as professional and scientific literatures review, comparative analysis, case study and computer simulation were applied and data interpretation was implemented using descriptive statistics and logical arguments. Therefore, hypothesis and proposed strategies were evaluated and an adaptable and reusable 2-dimensional building system was presented which can respond appropriately to dwellers and end-users needs and provide reusability of structural components of building system in new construction or function. Investigations showed that this incremental building system can be successfully applied in achieving the architectural design objectives and by small modifications on components and joints, it is easy to obtain different and adaptable load-optimized component alternatives for flexible spaces.

Keywords: adaptability, durability, open building, service life, structural building system

Procedia PDF Downloads 343
4282 An Analysis of a Queueing System with Heterogeneous Servers Subject to Catastrophes

Authors: M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan

Abstract:

This study analyzed a queueing system with blocking and no waiting line. The customers arrive according to a Poisson process and the service times follow exponential distribution. There are two non-identical servers in the system. The queue discipline is FCFS, and the customers select the servers on fastest server first (FSF) basis. The service times are exponentially distributed with parameters μ1 and μ2 at servers I and II, respectively. Besides, the catastrophes occur in a Poisson manner with rate γ in the system. When server I is busy or blocked, the customer who arrives in the system leaves the system without being served. Such customers are called lost customers. The probability of losing a customer was computed for the system. The explicit time dependent probabilities of system size are obtained and a numerical example is presented in order to show the managerial insights of the model. Finally, the probability that arriving customer finds system busy and average number of server busy in steady state are obtained numerically.

Keywords: queueing system, blocking, poisson process, heterogeneous servers, queue discipline FCFS, busy period

Procedia PDF Downloads 486
4281 Investigating the Influence of L2 Motivational Self-System on Willingness to Communicate in English: A Study of Chinese Non-English Major Students in EFL Classrooms

Authors: Wanghongshu Zhou

Abstract:

This study aims to explore the relationship between the L2MSS and WTC among Chinese non-English major students in order to provide pedagogical implications for English as a Foreign Language (EFL) classrooms in Chinese universities. By employing a mixed methods approach, we involved 103 Chinese non-English major students from a typical university in China, conducted questionnaire survey to measure their levels of L2WTC and L2MSS level, and then analyzed the correlation between the two above mentioned variables. Semi-structured interviews were conducted with eight participants to provide a deeper understanding and explanation of the questionnaire data. Findings show that 1) Chinese non-English major students’ ideal L2 self and L2 learning experience could positively predict their L2 WTC in EFL class; 2) Chinese non-English major students’ ought-to L2 self might have no significant impact on their L2 WTC in EFL class; and 3) self-confidence might be another main factor that will influence Chinese non-English major students’ L2 WTC in EFL class. These findings might shed light on the second language acquisition field and provide pedagogical recommendations for pre-service as well as in-service EFL teachers.

Keywords: L2 willingness to communicate, L2 motivation, self-confidence, Chinese non-English major students

Procedia PDF Downloads 64
4280 Coping Mechanisms for Families in Raising a Child with Disability in Bangladesh: Family Members' Perspectives

Authors: Reshma P. Nuri, Ebenezer Dassah

Abstract:

Introduction: Raising a child with a disability can affect family members in different ways. However, this can be determined by the way in which a family member copes with the situation. There is little research that explores how families develop coping strategies to overcome barriers in raising CWDs. Objective: This study explored family members’ coping mechanism in raising a child with disability in Bangladesh. Method: A qualitative approach that involved 20 interviews with family members of CWDs. A purposive sampling procedure was used in selecting the study participants. A digital recorder was used to record all the interviews. Transcriptions were done in Bengali, translated into English, and then imported to NVivo software 12 for analysis. Thematic analysis was used to analyze the data. Results: The study revealed that family members adopted different coping strategies for their CWDs, including seeking support from formal (e.g., service providers) and informal sources (family members and friends); relying on religious beliefs; accepting the situation. Additionally, to cope with extra cost in raising CWDs, family members strategies included relying on overtime work; borrowing money from financial institutions; selling or mortgaging assets; and replying on donations from community members. Finally, some families had to reduce spending on food and buying toys for their CWDs. Conclusion: This qualitative study highlighted a range of coping mechanism adopted by family members in Bangladesh. The information provided in this study is potentially important to policy makers and service providers as it presents evidence on the coping mechanism of families in raising their CWDs. This underscores the need for policy design and service delivery in government support system in Bangladesh and potentially in other low- and middle-income contexts.

Keywords: Bangladesh, children with disabilities, coping mechanism, family members

Procedia PDF Downloads 171
4279 Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions

Authors: Maher Aburrous, Adel Khelifi, Manar Abu Talib

Abstract:

Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents.

Keywords: XML transaction, encryption, Advanced Encryption Standard (AES), XML classification, e-banking security, fuzzy classification, cryptography, intelligent encryption

Procedia PDF Downloads 388
4278 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 140
4277 Summer STEM Camp for Elementary Students: A Conduit to Pre-Service Teacher Training to Learn How to Include a Makerspace for an Inclusive Classroom

Authors: Jennifer Gallup, Beverly Ray, Esther Ntuli

Abstract:

Many students such as students from linguistically or culturally diverse backgrounds and those with a disability remain chronically underrepresented in higher level science and mathematics disciplines as well as many hands-on-lab-based activities due to the need for remedial reading and mathematics instruction. Makerspace labs can be a conduit for supporting inclusive learning for these students through hands-on active learning strategies that support equitable access to STEM disciplines. Makerspace is a physical space where individuals gather to create, invent, innovate, and learn while using hands-on materials such as 2D and 3D printers, software programs, electronics, and other tools and supplies. Makerspaces are emerging across many P-12 settings; however, many teachers enter the field not prepared to harness the power inherent in a makerspace, especially for those with disabilities and differing needs. This paper offers suggestions on teaching pre-service teachers and practicing teachers how to incorporate a makerspace into their professional practice through guided instruction and hands-on practice. Recommendations for interested stakeholders are included as well.

Keywords: STEM learning, technology, autism, students with disabilities, makerspace

Procedia PDF Downloads 72
4276 Availability Strategy of Medical Information for Telemedicine Services

Authors: Rozo D. Juan Felipe, Ramírez L. Leonardo Juan, Puerta A. Gabriel Alberto

Abstract:

The telemedicine services require correct computing resource management to guarantee productivity and efficiency for medical and non-medical staff. The aim of this study was to examine web management strategies to ensure the availability of resources and services in telemedicine so as to provide medical information management with an accessible strategy. In addition, to evaluate the quality-of-service parameters, the followings were measured: delays, throughput, jitter, latency, available bandwidth, percent of access and denial of services based of web management performance map with profiles permissions and database management. Through 24 different test scenarios, the results show 100% in availability of medical information, in relation to access of medical staff to web services, and quality of service (QoS) of 99% because of network delay and performance of computer network. The findings of this study suggest that the proposed strategy of web management is an ideal solution to guarantee the availability, reliability, and accessibility of medical information. Finally, this strategy offers seven user profile used at telemedicine center of Bogota-Colombia keeping QoS parameters suitable to telemedicine services.

Keywords: availability, medical information, QoS, strategy, telemedicine

Procedia PDF Downloads 181
4275 The Lived Experiences and Coping Strategies of Women with Attention Deficit and Hyperactivity Disorder (ADHD)

Authors: Oli Sophie Meredith, Jacquelyn Osborne, Sarah Verdon, Jane Frawley

Abstract:

PROJECT OVERVIEW AND BACKGROUND: Over one million Australians are affected by ADHD at an economic and social cost of over $20 billion per annum. Despite health outcomes being significantly worse compared with men, women have historically been overlooked in ADHD diagnosis and treatment. While research suggests physical activity and other non-prescription options can help with ADHD symptoms, the frontline response to ADHD remains expensive stimulant medications that can have adverse side effects. By interviewing women with ADHD, this research will examine women’s self-directed approaches to managing symptoms, including alternatives to prescription medications. It will investigate barriers and affordances to potentially helpful approaches and identify any concerning strategies pursued in lieu of diagnosis. SIGNIFICANCE AND INNOVATION: Despite the economic and societal impact of ADHD on women, research investigating how women manage their symptoms is scant. This project is significant because although women’s ADHD symptoms are markedly different to those of men, mainstream treatment has been based on the experiences of men. Further, it is thought that in developing nuanced coping strategies, women may have masked their symptoms. Thus, this project will highlight strategies which women deem effective in ‘thriving’ rather than just ‘hiding’. By investigating the health service use, self-care and physical activity of women with ADHD, this research aligns with a priority research areas as identified by the November 2023 senate ADHD inquiry report. APPROACH AND METHODS: Semi-structured interviews will be conducted with up to 20 women with ADHD. Interviews will be conducted in person and online to capture experience across rural and metropolitan Australia. Participants will be recruited in partnership with the peak representative body, ADHD Australia. The research will use an intersectional framework, and data will be analysed thematically. This project is led by an interdisciplinary and cross-institutional team of women with ADHD. Reflexive interviewing skills will be employed to help interviewees feel more comfortable disclosing their experiences, especially where they share common ground ENGAGEMENT, IMPACT AND BENEFIT: This research will benefit women with ADHD by increasing knowledge of strategies and alternative treatments to prescription medications, reducing the social and economic burden of ADHD on Australia and on individuals. It will also benefit women by identifying risks involved with some self-directed approaches in lieu of medical advice. The project has an accessible impact plan to directly benefit end-users, which includes the development of a podcast and a PDF resource translating findings. The resources will reach a wide audience through ADHD Australia’s extensive national networks. We will collaborate with Charles Sturt’s Accessibility and Inclusion Division of Safety, Security and Well-being to create a targeted resource for students with ADHD.

Keywords: ADHD, women's health, self-directed strategies, health service use, physical activity, public health

Procedia PDF Downloads 51
4274 Development of Nursing Service System Integrated Case Manager Concept for the Patients with Epilepsy at the Tertiary Epilepsy Clinic of Thailand

Authors: C. Puangsawat, C. Limotai, P. Srikhachin

Abstract:

Bio-psycho-social caring was required for promoting the quality of life of the patients with epilepsy (PWE), despite controlled seizures. Multifaceted issues emerge at the epilepsy clinic. Unpredicted seizures, antiepileptic drug compliance problems/adverse effects, psychiatric, and social problems are all needed to be explored and managed. The Nursing Service System (NSS) at the tertiary epilepsy clinic (TEC) was consequently developed for improving the clinical care for PWE. Case manager concept was integrated as the framework guiding the processes and strategies used for developing the NSS as well as the roles of the multidisciplinary team at the clinic. This study aimed to report the outcomes of the developed NSS integrated case manager concept. The processes of our developed NSS program included 1) screening for patient’s problems using questionnaire prior to seeing epileptologists i.e., assessing the patient’s risk to develop acute seizures at the clinic, issues related to medication use, and uncovered psychiatric and social problems; and 2) assigning the patients at risk to be evaluated and managed by appropriate team. Nurses specializing in epilepsy in coordination with the multidisciplinary team implemented the NSS to promote coordinated work among the team which consists of epileptologists, nurses, pharmacists, psychologists, and social workers. Determination of the role of each person and their responsibilities along with joint care plan were clearly established. One year after implementation, the rate of acute seizure occurrence at the clinic was decreased, and satisfactory feedback from the patients was received. In order to achieve an optimal goal to promote self-management behaviors in PWE, continuing the NSS and systematic assessment of its effectiveness is required.

Keywords: case manager concept, nursing service system, patients with epilepsy, quality of life

Procedia PDF Downloads 112
4273 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 410
4272 Utilization of Cervical Cancer Screening Among HIV Infected Women in Nairobi, Kenya

Authors: E. Njuguna, S. Ilovi, P. Muiruri, K. Mutai, J. Kinuthia, P. Njoroge

Abstract:

Introduction: Cervical cancer is the commonest cause of cancer-related morbidity and mortality among women in developing countries in Sub Saharan Africa. Screening for cervical cancer in all women regardless of HIV status is crucial for the early detection of cancer of the cervix when treatment is most effective in curing the disease. It is particularly more important to screen HIV infected women as they are more at risk of developing the disease and progressing faster once infected with HPV (Human Papilloma Virus). We aimed to determine the factors affecting the utilization of cervical cancer screenings among HIV infected women above 18 years of age at Kenyatta National Hospital (KNH) Comprehensive Care Center (CCC). Materials and Methods: A cross-sectional mixed quantitative and qualitative study involving randomly and purposefully selected HIV positive female respectively was conducted. Qualitative data collection involved 4 focus group discussions of eligible female participants while quantitative data were acquired by one to one interviewer administered structured questionnaires. The outcome variable was the utilization of cervical cancer screening. Data were entered into Access data base and analyzed using Stata version 11.1. Qualitative data were analyzed after coding for significant clauses and transcribing to determine themes arising. Results: We enrolled a total of 387 patients, mean age (IQ range) 40 years (36-44). Cervical cancer screening utilization was 46% despite a health care provider recommendation of 85%. The screening results were reported as normal in 72 of 81 (88.9%) and abnormal 7 of 81(8.6%) of the cases. Those who did not know their result were 2 of 81(2.5%). Patients were less likely to utilize the service with increasing number of years attending the clinic (OR 0.9, 95% CI 0.86-0.99, p-value 0.02), but more likely to utilize the service if recommendation by a staff was made (OR 10, 95% CI 4.2-23.9, p<0.001), and if cervical screening had been done before joining KNH CCC (OR 2.9, 95% CI 1.7-4.9, p < 0.001). Similarly, they were more likely to rate the services on cervical cancer screening as good (OR 5.0, 95% CI 1.7-3.4, p <0.001) and very good (OR 8.1, 95% CI 2.5-6.1, p<0.001) if they had utilized the service. The main barrier themes emerging from qualitative data included fear of screening due to excessive pain or bleeding, lack of proper communication on screening procedures and increased waiting time. Conclusions: Utilization of cervical cancer screening services was low despite health care recommendation. Patient socio-demographic characteristics did not influence whether or not they utilized the services, indicating the important role of the health care provider in the referral and provision of the service.

Keywords: cervical, cancer, HIV, women, comprehensive care center

Procedia PDF Downloads 259
4271 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 227
4270 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges

Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold

Abstract:

If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).

Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience

Procedia PDF Downloads 159
4269 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 117
4268 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 244
4267 Impression Evaluation by Design Change of Anthropomorphic Agent

Authors: Kazuko Sakamoto

Abstract:

Anthropomorphic agents have been successful in areas where there are many human interactions, such as education and medical care. The persuasive effect is also expected in e-shopping sites on the web. This indicates that customer service is not necessarily human but can play that role. However, the 'humanity' in anthropomorphism sometimes has a risk of working negatively. In general, as the appearance of anthropomorphic agents approaches humans, it is thought that their affinity with humans increases. However, when the degree of similarity reaches a certain level, it gives the user a weird feeling. This is the 'eerie valley' phenomenon. This is a concept used in the world of robotics, but it seems to be applicable to anthropomorphic agents such as characters. Then what kind of design can you accept as an anthropomorphic agent that gives you a feeling of friendliness or good feeling without causing discomfort or fear to people? This study focused on this point and examined what design and characteristics would be effective for marketing communication. As a result of the investigation, it was found that there is no need for gaze and blinking, the size of the eyes is normal or large, and the impression evaluation is higher when the structure is as simple as possible. Conversely, agents with high eye-gaze and white-eye ratios had low evaluations, and the negative impact on eye-gaze was particularly large.

Keywords: anthropomorphicgents, design evaluation, marketing communication, customer service

Procedia PDF Downloads 92