Search results for: microwave security system
19676 Effect of Wind and Humidity on Microwave Links in West North Libya
Authors: M. S. Agha, A. M. Eshahiry, S. A. Aldabbar, Z. M. Alshahri
Abstract:
The propagation of microwave is affected by rain and dust particles by way of signal attenuation and de-polarization. Computations of these effects require knowledge of the propagation characteristics of microwave and millimeter wave energy in the climate conditions of the studied region. This paper presents the effect of wind and humidity on wireless communication such as microwave links in the west north region of Libya (Al-Khoms), experimental procedure to study the effects mentioned above. The experimental procedure is done on three selected antennae towers (Nagaza stations, Al-Khoms center stations, Al-Khoms gateway stations) to determining of the attenuation loss per unit length and cross-polarization discrimination (XPD) change which coverage in the studied region, it is required to collect the dust particles carried out by the wind, measure the particles size distribution (PSD), calculate the concentration, and carry chemical analysis of the contents, then the dielectric constant can be calculated. The result showed that effect of the humidity and dust, the antenna height, the visibility, on the complex permittivity effects both attenuation and phase shift, there is some consideration that has to be taken into account in the communication power budget.Keywords: attenuation, de-polarization, scattering, transmission loss
Procedia PDF Downloads 15219675 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance
Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz
Abstract:
The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor
Procedia PDF Downloads 6619674 Design and Implementation of an Image Based System to Enhance the Security of ATM
Authors: Seyed Nima Tayarani Bathaie
Abstract:
In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.Keywords: face detection algorithm, Haar features, security of ATM
Procedia PDF Downloads 41819673 A Security Study for Smart Metering Systems
Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty
Abstract:
In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.Keywords: security design, smart city, smart meter, smart grid, smart metering system
Procedia PDF Downloads 33319672 A Novel Software Model for Enhancement of System Performance and Security through an Optimal Placement of PMU and FACTS
Authors: R. Kiran, B. R. Lakshmikantha, R. V. Parimala
Abstract:
Secure operation of power systems requires monitoring of the system operating conditions. Phasor measurement units (PMU) are the device, which uses synchronized signals from the GPS satellites, and provide the phasors information of voltage and currents at a given substation. The optimal locations for the PMUs must be determined, in order to avoid redundant use of PMUs. The objective of this paper is to make system observable by using minimum number of PMUs & the implementation of stability software at 22OkV grid for on-line estimation of the power system transfer capability based on voltage and thermal limitations and for security monitoring. This software utilizes State Estimator (SE) and synchrophasor PMU data sets for determining the power system operational margin under normal and contingency conditions. This software improves security of transmission system by continuously monitoring operational margin expressed in MW or in bus voltage angles, and alarms the operator if the margin violates a pre-defined threshold.Keywords: state estimator (SE), flexible ac transmission systems (FACTS), optimal location, phasor measurement units (PMU)
Procedia PDF Downloads 40919671 Comparison of Pbs/Zns Quantum Dots Synthesis Methods
Authors: Mahbobeh Bozhmehrani, Afshin Farah Bakhsh
Abstract:
Nanoparticles with PbS core of 12 nm and shell of approximately 3 nm were synthesized at PbS:ZnS ratios of 1.01:0.1 using Merca Ptopropionic Acid as stabilizing agent. PbS/ZnS nanoparticles present a dramatically increase of Photoluminescence intensity, confirming the confinement of the PbS core by increasing the Quantum Yield from 0.63 to 0.92 by the addition of the ZnS shell. In this case, the synthesis by microwave method allows obtaining nanoparticles with enhanced optical characteristics than those of nanoparticles synthesized by colloidal method.Keywords: Pbs/Zns, quantum dots, colloidal method, microwave
Procedia PDF Downloads 28319670 Investigation of Detectability of Orbital Objects/Debris in Geostationary Earth Orbit by Microwave Kinetic Inductance Detectors
Authors: Saeed Vahedikamal, Ian Hepburn
Abstract:
Microwave Kinetic Inductance Detectors (MKIDs) are considered as one of the most promising photon detectors of the future in many Astronomical applications such as exoplanet detections. The MKID advantages stem from their single photon sensitivity (ranging from UV to optical and near infrared), photon energy resolution and high temporal capability (~microseconds). There has been substantial progress in the development of these detectors and MKIDs with Megapixel arrays is now possible. The unique capability of recording an incident photon and its energy (or wavelength) while also registering its time of arrival to within a microsecond enables an array of MKIDs to produce a four-dimensional data block of x, y, z and t comprising x, y spatial, z axis per pixel spectral and t axis per pixel which is temporal. This offers the possibility that the spectrum and brightness variation for any detected piece of space debris as a function of time might offer a unique identifier or fingerprint. Such a fingerprint signal from any object identified in multiple detections by different observers has the potential to determine the orbital features of the object and be used for their tracking. Modelling performed so far shows that with a 20 cm telescope located at an Astronomical observatory (e.g. La Palma, Canary Islands) we could detect sub cm objects at GEO. By considering a Lambertian sphere with a 10 % reflectivity (albedo of the Moon) we anticipate the following for a GEO object: 10 cm object imaged in a 1 second image capture; 1.2 cm object for a 70 second image integration or 0.65 cm object for a 4 minute image integration. We present details of our modelling and the potential instrument for a dedicated GEO surveillance system.Keywords: space debris, orbital debris, detection system, observation, microwave kinetic inductance detectors, MKID
Procedia PDF Downloads 9419669 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)
Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat
Abstract:
National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.Keywords: NTS, risk assessment, threat factors, security, services
Procedia PDF Downloads 7019668 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 39019667 Multi-Agent TeleRobotic Security Control System: Requirements Definitions of Multi-Agent System Using The Behavioral Patterns Analysis (BPA) Approach
Authors: Assem El-Ansary
Abstract:
This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Multi-Agent TeleRobotic Security Control System (MTSCS). The event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are the Behavioral Pattern Analysis (BPA) modeling methodology, and the development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.Keywords: analysis, multi-agent, TeleRobotics control, security, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases
Procedia PDF Downloads 43719666 Microwave Assisted Thermal Cracking of Castor Oil Zeolite ZSM-5 as Catalyst for Biofuel Production
Authors: Ghazi Faisal Najmuldeen, Ali Abdul Rahman–Al Ezzi, Tharmathas A/L Alagappan
Abstract:
The aim of this investigation was to produce biofuel from castor oil through microwave assisted thermal cracking with zeolite ZSM-5 as catalyst. The obtained results showed that microwave assisted thermal cracking of castor oil with Zeolite ZSM-5 as catalyst generates products consisting of alcohol, methyl esters and fatty acids. The products obtained from this experimental procedure by the cracking of castor oil are components of biodiesel. Samples of cracked castor oil containing 1, 3 and 5wt % catalyst was analyzed, however, only the sample containing the 5wt % catalyst showed significant presence of condensate. FTIR and GCMS studies show that the condensate obtained is an unsaturated fatty acid, is 9, 12-octadecadienoic acid, suitable for biofuel use. 9, 12-octadecadienoic acid is an unsaturated fatty acid with a molecular weight of 280.445 g/mol. Characterization of the sample demonstrates that functional group for the products from the three samples display a similar peak in the FTIR graph analysis at 1700 cm-1 and 3600 cm-1. The result obtained from GCMS shows that there are 16 peaks obtained from the sample. The compound with the highest peak area is 9, 12-octadecadienoic acid with a retention time of 9.941 and 24.65 peak areas. All these compounds are organic material and can be characterized as biofuel and biodiesel.Keywords: castor oil, biofuel, biodiesel, thermal cracking, microwave
Procedia PDF Downloads 23019665 Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle
Authors: Mir Shahriar Emami
Abstract:
Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.Keywords: SDLC, SSDLC, software security, software process engineering, hardware systems and circuits security
Procedia PDF Downloads 25919664 Mathematical Modeling of the Effect of Pretreatment on the Drying Kinetics, Energy Requirement and Physico-Functional Properties of Yam (Dioscorea Rotundata) and Cocoyam (Colocasia Esculenta)
Authors: Felix U. Asoiro, Kingsley O. Anyichie, Meshack I. Simeon, Chinenye E. Azuka
Abstract:
The work was aimed at studying the effects of microwave drying (450 W) and hot air oven drying on the drying kinetics and physico-functional properties of yams and cocoyams species. The yams and cocoyams were cut into chips of thicknesses of 3mm, 5mm, 7mm, 9mm, and 11mm. The drying characteristics of yam and cocoyam chips were investigated under microwave drying and hot air oven temperatures (50oC – 90oC). Drying methods, temperature, and thickness had a significant effect on the drying characteristics and physico-functional properties of yam and cocoyam. The result of the experiment showed that an increase in the temperature increased the drying time. The result also showed that the microwave drying method took lesser time to dry the samples than the hot air oven drying method. The iodine affinity of starch for yam was higher than that of cocoyam for the microwaved dried samples over those of hot air oven-dried samples. The results of the analysis would be useful in modeling the drying behavior of yams and cocoyams under different drying methods. It could also be useful in the improvement of shelf life for yams and cocoyams as well as designs of efficient systems for drying, handling, storage, packaging, processing, and transportation of yams and cocoyams.Keywords: coco yam, drying, microwave, modeling, energy consumption, iodine affinity, drying ate
Procedia PDF Downloads 10319663 Development of Microwave-Assisted Alkalic Salt Pretreatment Regimes for Enhanced Sugar Recovery from Corn Cobs
Authors: Yeshona Sewsynker
Abstract:
This study presents three microwave-assisted alkalic salt pretreatments to enhance delignification and enzymatic saccharification of corn cobs. The effects of process parameters of salt concentration (0-15%), microwave power intensity (0-800 W) and pretreatment time (2-8 min) on reducing sugar yield from corn cobs were investigated. Pretreatment models were developed with the high coefficient of determination values (R2>0.85). Optimization gave a maximum reducing sugar yield of 0.76 g/g. Scanning electron microscopy (SEM) and Fourier Transform Infrared analysis (FTIR) showed major changes in the lignocellulosic structure after pretreatment. A 7-fold increase in the sugar yield was observed compared to previous reports on the same substrate. The developed pretreatment strategy was effective for enhancing enzymatic saccharification from lignocellulosic wastes for microbial biofuel production processes and value-added products.Keywords: pretreatment, lignocellulosic biomass, enzymatic hydrolysis, delignification
Procedia PDF Downloads 49819662 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape
Authors: Sandesh Achar
Abstract:
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management
Procedia PDF Downloads 9619661 Classification of State Transition by Using a Microwave Doppler Sensor for Wandering Detection
Authors: K. Shiba, T. Kaburagi, Y. Kurihara
Abstract:
With global aging, people who require care, such as people with dementia (PwD), are increasing within many developed countries. And PwDs may wander and unconsciously set foot outdoors, it may lead serious accidents, such as, traffic accidents. Here, round-the-clock monitoring by caregivers is necessary, which can be a burden for the caregivers. Therefore, an automatic wandering detection system is required when an elderly person wanders outdoors, in which case the detection system transmits a ‘moving’ followed by an ‘absence’ state. In this paper, we focus on the transition from the ‘resting’ to the ‘absence’ state, via the ‘moving’ state as one of the wandering transitions. To capture the transition of the three states, our method based on the hidden Markov model (HMM) is built. Using our method, the restraint where the ‘resting’ state and ‘absence’ state cannot be transmitted to each other is applied. To validate our method, we conducted the experiment with 10 subjects. Our results show that the method can classify three states with 0.92 accuracy.Keywords: wander, microwave Doppler sensor, respiratory frequency band, the state transition, hidden Markov model (HMM).
Procedia PDF Downloads 18319660 Security Architecture for Cloud Networking: A Survey
Authors: Vishnu Pratap Singh Kirar
Abstract:
In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security
Procedia PDF Downloads 52819659 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 22119658 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 47519657 Tenure Security, Agricultural Diversity and Food Security
Authors: Amanuel Hadera Gebreyesus
Abstract:
In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.Keywords: tenure security, food security, agricultural diversity, dietary diversity, women
Procedia PDF Downloads 21319656 Millimeter Wave Antenna for 5G Mobile Communications Systems
Authors: Hind Mestouri
Abstract:
The study and simulation of a millimeter wave antenna for 5G mobile communication systems is the topic of this paper. We present at the beginning the general aspects of the 5G technology. We recall the objectives of the 5G standard, its architecture, and the parameters that characterize it. The proposed antenna model is designed using the CST Microwave Studio simulation software. Numerous methods are used at all steps of the design procedures, such as theoretical calculation of parameters, declaration of parameter values, and evaluation of the antenna through the obtained results. Initially, we were interested in the design of an antenna array at the 10 GHz frequency. Afterward, we also simulated and presented an antenna array at 2.5 GHz. For each antenna designed, a parametric study was conducted to understand and highlight the role and effects of the various parameters in order to optimize them and achieve a final efficient structure. The obtained results using CST Microwave Studio showed that the characteristics of the designed antennas (bandwidth, gain, radiation pattern) satisfy the specifications of 5G mobile communications.Keywords: 5G, antenna array, millimeter wave, 10 GHz, CST Microwave Studio
Procedia PDF Downloads 7819655 Microwave-Assisted Synthesis of Silver Nanoparticles from Dioscorea Deltoidea Callus Extract and Evaluation of Its Antimicrobial Activity
Authors: Mujeeb Mohd, Aqil Mohd, A. K. Najmi, Akhtar MMohd, Vasim Mohd
Abstract:
Dioscorea deltoidea belongs to the Dioscoreaceae family, is usually found in the north-western Himalayas and some other parts of the world up to an altitude of 1000–3000 m. D. deltoidea commonly known as yam and is an extensively used medicinal plant in the indigenous system of medicine. It has been reported to contain dioscine a steroidal glycoside in higher concentration. In the present investigation, silver nanoparticles (AgNPs) have been synthesized by a simple, efficient, environmentally benevolent and economic microwave-assisted method. Callus culture of D. deltoidea was developed and maintained on Murashige and skooge basal medium supplemented with different combination and concentration of plant growth regulators. Aqueous extract of callus culture was used as the reducing and stabilizing agent. The synthesized nanoparticles have been characterized by UV–Vis spectroscopy, Fourier transform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM), scanning electron microscopy (SEM) and X-ray diffraction (XRD analysis. The presence of a characteristic surface plasmon resonance (SPR) absorption band at 430 nm in UV–Vis reveals the reduction of silver metal ions into silver nanoparticles. Whereas FTIR analysis was performed to probe the possible functional group involved in the synthesis of AgNPs. Further extract and AgNPs were evaluated for antimicrobial activity against different pathogenic microorganisms.Keywords: antimicrobial, Dioscorea deltoidea, microwave, silver, nanoparticles
Procedia PDF Downloads 26519654 Electrohydrodynamic Study of Microwave Plasma PECVD Reactor
Authors: Keltoum Bouherine, Olivier Leroy
Abstract:
The present work is dedicated to study a three–dimensional (3D) self-consistent fluid simulation of microwave discharges of argon plasma in PECVD reactor. The model solves the Maxwell’s equations, continuity equations for charged species and the electron energy balance equation, coupled with Poisson’s equation, and Navier-Stokes equations by finite element method, using COMSOL Multiphysics software. In this study, the simulations yield the profiles of plasma components as well as the charge densities and electron temperature, the electric field, the gas velocity, and gas temperature. The results show that the microwave plasma reactor is outside of local thermodynamic equilibrium.The present work is dedicated to study a three–dimensional (3D) self-consistent fluid simulation of microwave discharges of argon plasma in PECVD reactor. The model solves the Maxwell’s equations, continuity equations for charged species and the electron energy balance equation, coupled with Poisson’s equation, and Navier-Stokes equations by finite element method, using COMSOL Multiphysics software. In this study, the simulations yield the profiles of plasma components as well as the charge densities and electron temperature, the electric field, the gas velocity, and gas temperature. The results show that the microwave plasma reactor is outside of local thermodynamic equilibrium.Keywords: electron density, electric field, microwave plasma reactor, gas velocity, non-equilibrium plasma
Procedia PDF Downloads 32819653 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application
Authors: Senthuran Manoharan, Rathesan Sivagananalingam
Abstract:
One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.Keywords: authentication, adaptive authentication, machine learning, security
Procedia PDF Downloads 24619652 Simple Ways to Enhance the Security of Web Services
Authors: Majid Azarniush, Soroush Mokallaei
Abstract:
Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.Keywords: firewalls, security, web services, software
Procedia PDF Downloads 51019651 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures
Authors: Zeinab Ranjbar
Abstract:
Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security
Procedia PDF Downloads 38519650 Security Issues and Primary School Participation in Kenya
Authors: Rose Mwanza
Abstract:
This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.Keywords: ethnicity, social media, participation in school, poverty, terrorism
Procedia PDF Downloads 5819649 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014
Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini
Abstract:
Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value19648 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities
Procedia PDF Downloads 20219647 Microwave-Assisted Inorganic Salt Pretreatment of Sugarcane Leaf Waste
Authors: Preshanthan Moodley, E. B. Gueguim-Kana
Abstract:
The objective of this study was to develop a method to pretreat sugarcane leaf waste using microwave-assisted (MA) inorganic salt. The effects of process parameters of salt concentration, microwave power intensity and pretreatment time on reducing sugar yield from enzymatically hydrolysed sugarcane leaf waste were investigated. Pretreatment models based on MA-NaCl, MA-ZnCl2 and MA-FeCl3 were developed. Maximum reducing sugar yield of 0.406 g/g was obtained with 2 M FeCl3 at 700W for 3.5 min. Scanning electron microscopy (SEM) and Fourier Transform Infrared analysis (FTIR) showed major changes in lignocellulosic structure after MA-FeCl3 pretreatment with 71.5 % hemicellulose solubilization. This pretreatment was further assessed on sorghum leaves and Napier grass under optimal MA-FeCl3 conditions. A 2 fold and 3.1-fold increase in sugar yield respectively were observed compared to previous reports. This pretreatment was highly effective for enhancing enzymatic saccharification of lignocellulosic biomass.Keywords: acid, pretreatment, salt, sugarcane leaves
Procedia PDF Downloads 451