Search results for: wlan security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2851

Search results for: wlan security

511 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 230
510 Towards an Enhanced Quality of IPTV Media Server Architecture over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

The aim of this paper is to present the QoE (Quality of Experience) IPTV SDN-based media streaming server enhanced architecture for configuring, controlling, management and provisioning the improved delivery of IPTV service application with low cost, low bandwidth, and high security. Furthermore, it is given a virtual QoE IPTV SDN-based topology to provide an improved IPTV service based on QoE Control and Management of multimedia services functionalities. Inside OpenFlow SDN Controller there are enabled in high flexibility and efficiency Service Load-Balancing Systems; based on the Loading-Balance module and based on GeoIP Service. This two Load-balancing system improve IPTV end-users Quality of Experience (QoE) with optimal management of resources greatly. Through the key functionalities of OpenFlow SDN controller, this approach produced several important features, opportunities for overcoming the critical QoE metrics for IPTV Service like achieving incredible Fast Zapping time (Channel Switching time) < 0.1 seconds. This approach enabled Easy and Powerful Transcoding system via FFMPEG encoder. It has the ability to customize streaming dimensions bitrates, latency management and maximum transfer rates ensuring delivering of IPTV streaming services (Audio and Video) in high flexibility, low bandwidth and required performance. This QoE IPTV SDN-based media streaming architecture unlike other architectures provides the possibility of Channel Exchanging between several IPTV service providers all over the word. This new functionality brings many benefits as increasing the number of TV channels received by end –users with low cost, decreasing stream failure time (Channel Failure time < 0.1 seconds) and improving the quality of streaming services.

Keywords: improved quality of experience (QoE), OpenFlow SDN controller, IPTV service application, softwarization

Procedia PDF Downloads 149
509 In Exile but Not at Peace: An Ethnography among Rwandan Army Deserters in South Africa

Authors: Florence Ncube

Abstract:

This paper examines the military and post-military experiences of soldiers who deserted from the Rwanda Defence Force (RDF) and tried to make a living in South Africa. Because they are deserters, they try to hide their military identity, yet it is simultaneously somewhat coercively ascribed to them by the Rwandan state and can put them in potential danger. The paper attends to the constructions, experiences, practices, and subjective understanding of the deserters’ being in exile to examine how, under circumstances of perceived threat, these men navigate real or perceived state-sponsored surveillance and threat in non-military settings in South Africa where they have become potential political and disciplinary targets. To make sense of the deserters’ experiences in these circumstances, the paper stitches together a number of useful theoretical concepts, including Bourdieu’s (1992) theory of practice and Vigh’s (2009; 2018) concept of social navigation because no single approach can coherently analyze the specificity of this study. Conventional post-military literature privileges an understanding of army desertion as a malignancy and somewhat problematic. Little is known about the military and post-military experiences of deserters who believe that army desertion is in fact a building block towards achieving subjective peace, even in the context of exile. The paper argues that the presence of Rwandan state agents in South Africa strips the context of the exile of its capacity to provide the deserters with peace, safety, and security. This paper recenters army desertion in analyses of militarism, soldiering, and transition in African contexts and complicates commonsense understandings of army desertion which assume that it is entirely problematic. This paper is drawn from an ethnography conducted among 30 junior-rank Rwandan army deserters exiled in Johannesburg and Cape Town. The researcher employed life histories, in-depth interviews, and deep hangouts to collect data.

Keywords: army deserter, military, identity, exile, peacebuilding, South Africa

Procedia PDF Downloads 71
508 A Convolutional Neural Network Based Vehicle Theft Detection, Location, and Reporting System

Authors: Michael Moeti, Khuliso Sigama, Thapelo Samuel Matlala

Abstract:

One of the principal challenges that the world is confronted with is insecurity. The crime rate is increasing exponentially, and protecting our physical assets especially in the motorist industry, is becoming impossible when applying our own strength. The need to develop technological solutions that detect and report theft without any human interference is inevitable. This is critical, especially for vehicle owners, to ensure theft detection and speedy identification towards recovery efforts in cases where a vehicle is missing or attempted theft is taking place. The vehicle theft detection system uses Convolutional Neural Network (CNN) to recognize the driver's face captured using an installed mobile phone device. The location identification function uses a Global Positioning System (GPS) to determine the real-time location of the vehicle. Upon identification of the location, Global System for Mobile Communications (GSM) technology is used to report or notify the vehicle owner about the whereabouts of the vehicle. The installed mobile app was implemented by making use of python as it is undoubtedly the best choice in machine learning. It allows easy access to machine learning algorithms through its widely developed library ecosystem. The graphical user interface was developed by making use of JAVA as it is better suited for mobile development. Google's online database (Firebase) was used as a means of storage for the application. The system integration test was performed using a simple percentage analysis. Sixty (60) vehicle owners participated in this study as a sample, and questionnaires were used in order to establish the acceptability of the system developed. The result indicates the efficiency of the proposed system, and consequently, the paper proposes the use of the system can effectively monitor the vehicle at any given place, even if it is driven outside its normal jurisdiction. More so, the system can be used as a database to detect, locate and report missing vehicles to different security agencies.

Keywords: CNN, location identification, tracking, GPS, GSM

Procedia PDF Downloads 172
507 A Study of Blood Alcohol Concentration in People Arrested for Various Offences and Its Demographic Pattern

Authors: Tabin Millo, Khoob Chand, Ashok Kumar Jaiswal

Abstract:

Introduction: Various kinds of violence and offences are related to alcohol consumption by the offenders. The relationship between alcohol and violence is complex. But its study is important to achieve understanding of violence as well as alcohol related behavior. This study was done to know the blood alcohol concentration in people involved in various offences and its demographic pattern. The study was carried out in the forensic toxicology laboratory, department of Forensic Medicine, All India Institute of Medical Sciences, New Delhi, India. Material and methods: The blood samples were collected from the arrested people shortly after the commission of the offence by the emergency medical officers in the emergency department and forwarded to the forensic toxicology laboratory through the investigating officer. The blood samples were collected in EDTA vial with sodium fluoride preservative. The samples were analyzed by using gas chromatography with head space (GC-HS), which is ideal for alcohol estimation. The toxicology reports were given within a week. The data of seven years (2011-17) were analyzed for its alcohol concentration, associated crimes and its demographic pattern. Analysis and conclusion: Total 280 samples were analyzed in the period of 2011-2017. All were males except one female who was a bar dancer. The maximum cases were in the age group of 21-30 years (124 cases). The type of offences involved were road traffic accidents (RTA), assault cases, drunken driving, drinking in public place, drunk on duty, sexual offence, bestiality, eve teasing, fall etc. The maximum cases were of assault (75 cases) followed by RTA (64 cases). The maximum cases were in the alcohol concentration range of 101-150mg% (58 cases) followed by 51-100mg% (52 cases). The maximum blood alcohol level detected was 391.51 mg%, belonging to a security guard found unconscious. This study shows that alcohol consumption is associated with various kinds of violence and offences in society.

Keywords: alcohol, crime, toxicology, violence

Procedia PDF Downloads 144
506 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria

Authors: Abdur Raheem, Ado Yakub

Abstract:

Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the north eastern parts have ignited violence, bloodshed, refuge exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of these social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for prompt response, encourage community and neighbourhood policing to ameliorate security challenges in Nigeria.

Keywords: social crisis, property market, economy, resources, north-eastern Nigeria

Procedia PDF Downloads 323
505 Challenges in the Management of Her2 Neu Positive Breast Cancer Patients: Real World Data from India

Authors: Praveen Adusumilli, Meher Lakshmi Konatam, Sadashivudu Gundeti, Stalin Bala

Abstract:

The invention of trastuzumab has changed the treatment of breast cancer and lives of many patients all over the world. Despite many patients getting benefitted from the drug, it is out of reach for most of the patients. There is very limited real world data regarding the epidemiology and clinical outcome of Her2neu positive breast cancer patients. Materials and Methods: This is a retrospective analysis of breast cancer patients presenting to a tertiary care cancer centre in Southern India from 2007 to2013. All early and locally advanced breast cancer patients, who were Her2neu 3+ on IHC are included in the study and evaluated in terms of epidemiology, 3-year disease free survival (DFS)and 5-year overall survival(OS). Chemotherapy regimens used were-FAC 6 cycles or AC 4 cycles followed by 12 cycles of weekly paclitaxel . Trastuzumab was given after 6 cycles of FAC or weekly with paclitaxel followed by 3weekly maintenance until 1 year. Results: Over the period of this study there were 885 newly diagnosed cases of carcinoma breast, of which 242 (27%) were Her2neu positive, 360(40%) were hormone receptor positive, and 212(24%) were triple negative. A total of 71(8%) were Her2neu equivocal of which only 10 patients got FISH test done. Of the 212 newly diagnosed patients, only 74 (29%) opted to have standard of care therapy with trastuzumab at our centre, out of which 52(24%), 8(3%), received under insurance, paying basis respectively. 14(9%) patients received the care as part of clinical trial program (ALTTO trial). 7 (9.72%) patients developed decrease of ejection fraction by greater than 10%, requiring stoppage of trastuzumab out of which 5 were restarted in 2 months. Patients receiving trastuzumab along with chemotherapy had longer 3year DFS 92% vs. 60% (p value<0.0001) when compared to chemotherapy alone. 5 year OS was 87% vs 44% (p-value <0.0001) compared to chemotherapy alone. Conclusion: Trastuzumab with chemotherapy improves the DFS and OS in Her2neu positive patients. The biggest constraint is the cost of the treatment and absence of universal health security net to treat all patients with this diagnosis.

Keywords: breast cancer, Her 2 neu positive, real world data, Trastuzumab

Procedia PDF Downloads 169
504 The Crisis of Displacement and Resettlement of Bakassi People of the Nigeria-Cameroon Borderlands

Authors: Geoffrey Nwaka

Abstract:

After many years of a border dispute between Nigeria and Cameroon over the ownership of the Bakassi Peninsula, the International Court of Justice ruled in 2002 that, based on the 1913 colonial boundary agreement between Britain and Germany, the oil-rich Peninsula, inhabited for generations by Nigerians, and hitherto administered as one of Nigeria’s 774 Local Government Areas, belongs to Cameroon, and not to Nigeria. Under pressure from the international community, Nigeria and Cameroon signed the Greentree Accord in 2006 to comply peacefully with the ICJ ruling and to protect the fundamental rights and freedoms of the Bakassi people, whether they opted to remain in the Peninsula under the authority of Cameroon or relocate to Nigeria. Sadly, the Nigerian government and the international community underestimated the scale of displacement that would follow the withdrawal of the Nigerian administration and military forces from the area and did not prepare adequately for the massive influx of tens of thousands of Bakassi people hurriedly dislodged by the reported hostility of the Cameroon authorities and their security services. The paper discusses the historical context and contemporary significance of the crisis, the chaotic resettlement schemes and appalling humanitarian relief camps in ‘New Bakassi’, and the prolonged hardship and disillusionment of the disaffected refugees/returnees. The lesson for African and Asian governments and peoples is to avoid needless conflicts over the 'imported' colonial boundaries, to remove unnecessary border restrictions, and take fully into account the development needs and well-being of borderland communities that sometimes rightly feel that distant central governments negotiate their political and international interests at the expense of the borderlands; and finally, to begin to see the boundaries more as links and bridges for the cooperation and integration of African and Asian states and peoples, rather than as barriers and static lines of demarcation on the map.

Keywords: Africa, forced displacement, resettlement, border conflict, Bakassi

Procedia PDF Downloads 19
503 Multi Biomertric Personal Identification System Based On Hybird Intellegence Method

Authors: Laheeb M. Ibrahim, Ibrahim A. Salih

Abstract:

Biometrics is a technology that has been widely used in many official and commercial identification applications. The increased concerns in security during recent years (especially during the last decades) have essentially resulted in more attention being given to biometric-based verification techniques. Here, a novel fusion approach of palmprint, dental traits has been suggested. These traits which are authentication techniques have been employed in a range of biometric applications that can identify any postmortem PM person and antemortem AM. Besides improving the accuracy, the fusion of biometrics has several advantages such as increasing, deterring spoofing activities and reducing enrolment failure. In this paper, a first unimodel biometric system has been made by using (palmprint and dental) traits, for each one classification applying an artificial neural network and a hybrid technique that combines swarm intelligence and neural network together, then attempt has been made to combine palmprint and dental biometrics. Principally, the fusion of palmprint and dental biometrics and their potential application has been explored as biometric identifiers. To address this issue, investigations have been carried out about the relative performance of several statistical data fusion techniques for integrating the information in both unimodal and multimodal biometrics. Also the results of the multimodal approach have been compared with each one of these two traits authentication approaches. This paper studies the features and decision fusion levels in multimodal biometrics. To determine the accuracy of GAR to parallel system decision-fusion including (AND, OR, Majority fating) has been used. The backpropagation method has been used for classification and has come out with result (92%, 99%, 97%) respectively for GAR, while the GAR) for this algorithm using hybrid technique for classification (95%, 99%, 98%) respectively. To determine the accuracy of the multibiometric system for feature level fusion has been used, while the same preceding methods have been used for classification. The results have been (98%, 99%) respectively while to determine the GAR of feature level different methods have been used and have come out with (98%).

Keywords: back propagation neural network BP ANN, multibiometric system, parallel system decision-fusion, practical swarm intelligent PSO

Procedia PDF Downloads 534
502 Changing Routes: The Adaptability of Somali Migrants and Their Smuggling Networks

Authors: Alexandra Amling, Emina Sadic

Abstract:

The migration routes linking the Horn of Africa to Europe shift in response to political and humanitarian developments across the region. Abrupt changes to those routes can have profound effects on the relative ease of movement and the well-being of migrants. Somali migrants have traditionally been able to rely on a sophisticated, well-established, and reliable network of smugglers to facilitate their journey through the Sahel to Libya, but changes to the routes have undermined those networks. Recently, these shifts have made the journey from Somalia to Europe much more perilous. As the Libyan coast guard intensifies its efforts to stymie boats leaving its coast for Italian shores, arrivals in Spain are trending upwards. This paper thus, will examine how the instability in transit countries that are most commonly used by Somali migrants has had an impact on the reliability of their massive network of smuggling, and how resurgence in the Western route toward Spain provides a potentially new opportunity to reach Europe—a route that has rarely been used by the Somali migrant population in the past. First, the paper will discuss what scholars have called the pastoralist, nomadic tradition of Somalis which reportedly has allowed them to endure the long journeys from Somalia to their chosen destinations. Facilitated by relatives or clan affiliation, Somali migrants have historically been able to rely on a smuggling network that – at least tangentially – provided more security nets during their travels. Given the violence and chaos that unfolded both in Libya and Yemen in 2011 and 2015, respectively, the paper will, secondly, examine which actors in smuggling hubs increase the vulnerabilities of Somalis, pushing them to consider other routes. As a result, this paper will consider to what extent Somalis could follow the stream of other migrants to Algeria and Morocco to enter Europe via Spain. By examining one particular group of migrants and the nature and limitations of the networks associated with their movements, the paper will demonstrate the resilience and adaptability of both the migrants and the networks regardless of the ever-changing nature of migration routes and actors.

Keywords: Europe, migration, smuggling networks, Somalia

Procedia PDF Downloads 192
501 Urban Agriculture among Households of Makurdi Metropolis of Benue State, Nigeria: Key Challenges

Authors: Evangeline Mbah, Margret Okeke, Agbo Joseph

Abstract:

Agriculture was primarily a rural activity in Nigeria, but due to increasing demand for food and jobs for many urban dwellers, it became necessary for urban households to embark on farming as a means of improving household food security and additional income for economic empowerment. Urban agriculture serves as a veritable tool for poverty reduction among people living in urban areas mostly low-income earners and unemployed. The survey was conducted to identify key challenges encountered by households in Makurdi metropolis of Benue state, Nigeria who are engaged in urban agriculture. A well-structured questionnaire was used to collect data from a sample of respondents used for the study. Data were analyzed using frequency, percentage, mean score and standard deviation. Results show that a greater percentage (46.0%) of the respondents engaged in cultivation of leafy vegetable, 22.0% cultivated cassava, 21.0% planted sweet potato, 18.0% cultivated tomato while 56.0% reared poultry, 23.0% kept goat, among others. Sources of agricultural information indicated by the respondents were family members/relations (85.0%), friends/neighbours (73.0%), radio (68.0%), extension agents (57.0%), etc. Major challenges encountered by the respondents in urban agriculture include inadequate size of farmland (M= 2.72), lack of access to credit facilities (M= 2.63), lack of funds (M= 2.50), high cost of labour (M= 2.49), insecurity of lands (M= 2.46), theft of crops at maturity (M= 2.38), lack of farm inputs such as improved varieties of seeds, fertilizer and exotic breeds of livestock (M= 2.23), destruction of crops by stray farm animals (M= 1.96), among others. The study recommends that there is a need for adequate provision of farm inputs by the government at all levels at a subsidized rate in order to reduce the cost of production and enhance optimum productivity.

Keywords: urban, agriculture, household, challenges, Makurdi, Nigeria

Procedia PDF Downloads 136
500 The Advantages of Using DNA-Barcoding for Determining the Fraud in Seafood

Authors: Elif Tugce Aksun Tumerkan

Abstract:

Although seafood is an important part of human diet and categorized highly traded food industry internationally, it is remain overlooked generally in the global food security aspect. Food product authentication is the main interest in the aim of both avoids commercial fraud and to consider the risks that might be harmful to human health safety. In recent years, with increasing consumer demand for regarding food content and it's transparency, there are some instrumental analyses emerging for determining food fraud depend on some analytical methodologies such as proteomic and metabolomics. While, fish and seafood consumed as fresh previously, within advanced technology, processed or packaged seafood consumption have increased. After processing or packaging seafood, morphological identification is impossible when some of the external features have been removed. The main fish and seafood quality-related issues are the authentications of seafood contents such as mislabelling products which may be contaminated and replacement partly or completely, by lower quality or cheaper ones. For all mentioned reasons, truthful consistent and easily applicable analytical methods are needed for assurance the correct labelling and verifying of seafood products. DNA-barcoding methods become popular robust that used in taxonomic research for endangered or cryptic species in recent years; they are used for determining food traceability also. In this review, when comparing the other proteomic and metabolic analysis, DNA-based methods are allowing a chance to identification all type of food even as raw, spiced and processed products. This privilege caused by DNA is a comparatively stable molecule than protein and other molecules. Furthermore showing variations in sequence based on different species and founding in all organisms, make DNA-based analysis more preferable. This review was performed to clarify the main advantages of using DNA-barcoding for determining seafood fraud among other techniques.

Keywords: DNA-barcoding, genetic analysis, food fraud, mislabelling, packaged seafood

Procedia PDF Downloads 169
499 Social Media as a Tool for Medication Adherence and Personal Health Management

Authors: Huang Wei-Chi, Li Wei, Yu Tien-Chieh

Abstract:

Medication adherence is crucial for treatment success. Adherence problem is common in patients with polypharmacy, especially in the geriatric population who are vulnerable to multiple chronic conditions but averagely less knowledgeable about diseases and medications. In order to help patients take medications appropriately and enhance the understanding of diseases or medications, a Line official account named e-Pharmacist was designed. The line is a popular freeware app with the highest penetration rate (95.7%) in Taiwan. The interface of e-Pharmacist is user-friendly for easy-to-read and convenient operating. Differ from other medication adherence apps, users just added e-Pharmacist as a LINE friend without installing any more apps and the drug lists were automatically downloaded from the personal electronic medical records with security permission. Over and above medication reminder, several additional capabilities were set up and engaged in the platform of e-Pharmacist including prescription refill reservation, laboratory examination consultation, medical appointment registration, and “Daily Health Log” where patients can record and track data of blood pressure/blood sugar and daily meals for self-health management as well as can share the important information to clinical professionals when seeking medical help. Additionally, a Line chatbot was utilized to provide tailored medicine information for the individual user. From July 2020 to March 2022, around 3000 patients added e-pharmacist as Line friends. Every day more than 1500 patients receive messages from e-pharmacist to notify them to take medicine. Thanks to the e-pharmacist alert system and Chatbot, the low-compliance patients (defined by Program on Adherence to Medication, PAM) significantly dropped from 36% to 6%, whereas the high-compliance patients dramatically increased from 13% to 77%. The user satisfaction is 98%. In brief, an e-pharmacist is not only a medication reminder but also a tailored personal assistant with value-added service for health management.

Keywords: e-pharmacist, self-health management, medication reminder, value-added service

Procedia PDF Downloads 161
498 Assessing the Benefits of Super Depo Sutorejo as a Model of integration of Waste Pickers in a Sustainable City Waste Management

Authors: Yohanes Kambaru Windi, Loetfia Dwi Rahariyani, Dyah Wijayanti, Eko Rustamaji

Abstract:

Surabaya, the second largest city in Indonesia, has been struggling for years with waste production and its management. Nearly 11,000 tons of waste are generated daily by domestic, commercial and industrial areas. It is predicted that approximately 1,300 tons of waste overflew the Benowo Landfill daily in 2013 and projected that the landfill operation will be critical in 2015. The Super Depo Sutorejo (SDS) is a pilot project on waste management launched by the government of Surabaya in March 2013. The project is aimed to reduce the amount of waste dumped in landfill by sorting the recyclable and organic waste for composting by employing waste pickers to sort the waste before transported to landfill. This study is intended to assess the capacity of SDS to process and reduce waste and its complementary benefits. It also overviews the benefits of the project to the waste pickers in term of satisfaction to the job. Waste processing data-sheets were used to assess the difference between input and outputs waste. A survey was distributed to 30 waste pickers and interviews were conducted as a further insight on a particular issue. The analysis showed that SDS enable to reduce waste up to 50% before dumped in the final disposal area. The cost-benefits analysis using cost differential calculation revealed the economic benefit is considerable low, but composting may substitute tangible benefits for maintain the city’s parks. Waste pickers are mostly satisfied with their job (i.e. Salary, health coverage, job security), services and facilities available in SDS and enjoyed rewarding social life within the project. It is concluded that SDS is an effective and efficient model for sustainable waste management and reliable to be developed in developing countries. It is a strategic approach to empower and open up working opportunity for the poor urban community and prolong the operation of landfills.

Keywords: cost-benefits, integration, satisfaction, waste management

Procedia PDF Downloads 476
497 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying

Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam

Abstract:

The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.

Keywords: adolescents, values, cyberbullying, online behavior, power

Procedia PDF Downloads 66
496 Digi-Buddy: A Smart Cane with Artificial Intelligence and Real-Time Assistance

Authors: Amaladhithyan Krishnamoorthy, Ruvaitha Banu

Abstract:

Vision is considered as the most important sense in humans, without which leading a normal can be often difficult. There are many existing smart canes for visually impaired with obstacle detection using ultrasonic transducer to help them navigate. Though the basic smart cane increases the safety of the users, it does not help in filling the void of visual loss. This paper introduces the concept of Digi-Buddy which is an evolved smart cane for visually impaired. The cane consists for several modules, apart from the basic obstacle detection features; the Digi-Buddy assists the user by capturing video/images and streams them to the server using a wide-angled camera, which then detects the objects using Deep Convolutional Neural Network. In addition to determining what the particular image/object is, the distance of the object is assessed by the ultrasonic transducer. The sound generation application, modelled with the help of Natural Language Processing is used to convert the processed images/object into audio. The object detected is signified by its name which is transmitted to the user with the help of Bluetooth hear phones. The object detection is extended to facial recognition which maps the faces of the person the user meets in the database of face images and alerts the user about the person. One of other crucial function consists of an automatic-intimation-alarm which is triggered when the user is in an emergency. If the user recovers within a set time, a button is provisioned in the cane to stop the alarm. Else an automatic intimation is sent to friends and family about the whereabouts of the user using GPS. In addition to safety and security by the existing smart canes, the proposed concept devices to be implemented as a prototype helping visually-impaired visualize their surroundings through audio more in an amicable way.

Keywords: artificial intelligence, facial recognition, natural language processing, internet of things

Procedia PDF Downloads 355
495 Paradigm Shift of the World Is Globalization: Identity Crisis, Violence and Cultural War

Authors: Shahla Bukhtair

Abstract:

A paradigm presents a consensus view of a particular or collective community, accepted into by the members of that community, either consciously pronounced or, more likely, simply assumed and not intentionally acknowledged but is articulated. Paradigm shift is based on the behavioral attitude of the community. Change is inexorable. The world is suffering with the innovative creation of globalization. Media boosted this paradigm shift all over the world. Globalization is a vigorous process which impacts differentially on various cultures around the world. The outcome of the globalization is permeates cultural boundaries and in the process results in the spread of Western ideologies and values across the world. The term flourished in 20th century. Globalization is regarded as having substantial impact on such crises through its encouragement of conflicts rather than conciliation; through opportunities of expression, various groups get benefit with it. Identity crisis refers to inflexible mechanism i.e. cultural and political conflicts among polarized groups, which struggle with each other over the definition of a national identity. Violence is not only a kind of physical but it also psychological as well. Due to identity crisis, a person is having an issue of fear, anxiety, and lack of security. Everything has negative and positive aspects. Newspaper columns, magazine articles, films, made-for-TV movies, television special reports, and talk shows are all public arenas where images of political agenda of their own interest are constructed, debated, and reproduced. From these resources, individuals construct their own conceptions of what is normal and acceptable. This bias affects images in the media, and in turn has a negative effect on public development in a society. This paper investigates the relationship between globalization and cultural war, identity crisis and the role of violence. Objectives: - To determine which type of media plays an important role in shaping perceptions and attitudes of public negatively; - To analyze the impact of globalization on identity crisis, violence and global culture (positive and negative).

Keywords: paradigm shift, globalization, identity crisis, cultural war

Procedia PDF Downloads 371
494 Transmission Line Protection Challenges under High Penetration of Renewable Energy Sources and Proposed Solutions: A Review

Authors: Melake Kuflom

Abstract:

European power networks involve the use of multiple overhead transmission lines to construct a highly duplicated system that delivers reliable and stable electrical energy to the distribution level. The transmission line protection applied in the existing GB transmission network are normally independent unit differential and time stepped distance protection schemes, referred to as main-1 & main-2 respectively, with overcurrent protection as a backup. The increasing penetration of renewable energy sources, commonly referred as “weak sources,” into the power network resulted in the decline of fault level. Traditionally, the fault level of the GB transmission network has been strong; hence the fault current contribution is more than sufficient to ensure the correct operation of the protection schemes. However, numerous conventional coal and nuclear generators have been or about to shut down due to the societal requirement for CO2 emission reduction, and this has resulted in a reduction in the fault level on some transmission lines, and therefore an adaptive transmission line protection is required. Generally, greater utilization of renewable energy sources generated from wind or direct solar energy results in a reduction of CO2 carbon emission and can increase the system security and reliability but reduces the fault level, which has an adverse effect on protection. Consequently, the effectiveness of conventional protection schemes under low fault levels needs to be reviewed, particularly for future GB transmission network operating scenarios. The proposed paper will evaluate the transmission line challenges under high penetration of renewable energy sources andprovides alternative viable protection solutions based on the problem observed. The paper will consider the assessment ofrenewable energy sources (RES) based on a fully rated converter technology. The DIgSILENT Power Factory software tool will be used to model the network.

Keywords: fault level, protection schemes, relay settings, relay coordination, renewable energy sources

Procedia PDF Downloads 208
493 Water Scarcity in the Gomti Nagar Area under the Impact of Climate Changes and Assessment for Groundwater Management

Authors: Rajkumar Ghosh

Abstract:

Climate change has led to decreased water availability in the Gomti Nagar area of Uttar Pradesh, India. Climate change has reduced the amount of precipitation and increased the rate of evaporation. The region is heavily reliant on surface water sources (Gomti river, Sharda Canal) and groundwater. Efficient management of groundwater resources is crucial for addressing water shortages. These may include: Exploring alternative water sources, such as wastewater recycling and desalination, can help augment water supply and reduce dependency on rainfall-dependent sources. Promoting the use of water-efficient technologies in industries, agriculture, and water-efficient infrastructure in urban areas can contribute to reducing water demand and optimizing water use. Incorporating climate change considerations into urban planning and infrastructure development can help ensure water security in the face of future climate uncertainties. Addressing water scarcity in the Gomti Nagar area requires a multi-pronged approach that combines sustainable groundwater management practices, climate change adaptation strategies, and integrated water resource management. By implementing these measures, the region can work towards ensuring a more sustainable and reliable water supply in the context of climate change. Water is the most important natural resource for the existence of living beings in the Earth's ecosystem. On Earth, 1.2 percent of the water is drinkable, but only 0.3 percent is usable by people. Water scarcity is a growing concern in India due to the impact of climate change and over-exploitation of water resources. Excess groundwater withdrawal causes regular declines in groundwater level. Due to city boundary expansion and growing urbanization, the recharge point for groundwater tables is decreasing. Rainwater infiltration into the subsoil is also reduced by unplanned, uneven settlements in urban change.

Keywords: climate change, water scarcity, groundwater, rainfall, water supply

Procedia PDF Downloads 84
492 Swift Rising Pattern of Emerging Construction Technology Trends in the Construction Management

Authors: Gayatri Mahajan

Abstract:

Modern Construction Technology (CT) includes a broad range of advanced techniques and practices that bound the recent developments in material technology, design methods, quantity surveying, facility management, services, structural analysis and design, and other management education. Adoption of recent digital transformation technology is the need of today to speed up the business and is also the basis of construction improvement. Incorporating and practicing the technologies such as cloud-based communication and collaboration solution, Mobile Apps and 5G,3D printing, BIM and Digital Twins, CAD / CAM, AR/ VR, Big Data, IoT, Wearables, Blockchain, Modular Construction, Offsite Manifesting, Prefabrication, Robotic, Drones and GPS controlled equipment expedite the progress in the Construction industry (CI). Resources used are journaled research articles, web/net surfing, books, thesis, reports/surveys, magazines, etc. The outline of the research organization for this study is framed at four distinct levels in context to conceptualization, resources, innovative and emerging trends in CI, and better methods for completion of the construction projects. The present study conducted during 2020-2022 reveals that implementing these technologies improves the level of standards, planning, security, well-being, sustainability, and economics too. Application uses, benefits, impact, advantages/disadvantages, limitations and challenges, and policies are dealt with to provide information to architects and builders for smooth completion of the project. Results explain that construction technology trends vary from 4 to 15 for CI, and eventually, it reaches 27 for Civil Engineering (CE). The perspective of the most recent innovations, trends, tools, challenges, and solutions is highly embraced in the field of construction. The incorporation of the above said technologies in the pandemic Covid -19 and post-pandemic might lead to a focus on finding out effective ways to adopt new-age technologies for CI.

Keywords: BIM, drones, GPS, mobile apps, 5G, modular construction, robotics, 3D printing

Procedia PDF Downloads 105
491 Ending Wars Over Water: Evaluating the Extent to Which Artificial Intelligence Can Be Used to Predict and Prevent Transboundary Water Conflicts

Authors: Akhila Potluru

Abstract:

Worldwide, more than 250 bodies of water are transboundary, meaning they cross the political boundaries of multiple countries. This creates a system of hydrological, economic, and social interdependence between communities reliant on these water sources. Transboundary water conflicts can occur as a result of this intense interdependence. Many factors contribute to the sparking of transboundary water conflicts, ranging from natural hydrological factors to hydro-political interactions. Previous attempts to predict transboundary water conflicts by analysing changes or trends in the contributing factors have typically failed because patterns in the data are hard to identify. However, there is potential for artificial intelligence and machine learning to fill this gap and identify future ‘hotspots’ up to a year in advance by identifying patterns in data where humans can’t. This research determines the extent to which AI can be used to predict and prevent transboundary water conflicts. This is done via a critical literature review of previous case studies and datasets where AI was deployed to predict water conflict. This research not only delivered a more nuanced understanding of previously undervalued factors that contribute toward transboundary water conflicts (in particular, culture and disinformation) but also by detecting conflict early, governance bodies can engage in processes to de-escalate conflict by providing pre-emptive solutions. Looking forward, this gives rise to significant policy implications and water-sharing agreements, which may be able to prevent water conflicts from developing into wide-scale disasters. Additionally, AI can be used to gain a fuller picture of water-based conflicts in areas where security concerns mean it is not possible to have staff on the ground. Therefore, AI enhances not only the depth of our knowledge about transboundary water conflicts but also the breadth of our knowledge. With demand for water constantly growing, competition between countries over shared water will increasingly lead to water conflict. There has never been a more significant time for us to be able to accurately predict and take precautions to prevent global water conflicts.

Keywords: artificial intelligence, machine learning, transboundary water conflict, water management

Procedia PDF Downloads 107
490 Communities And Local Food Systems In The Post Pandemic World: Lessons For Kerala

Authors: Salimah Hasnah, Namratha Radhakrishnan

Abstract:

Communities play a vital role in mobilizing people and resources for the benefit of all. Since time immemorial, communities have been spear heading different activities ranging from disaster management, palliative care, local economic development and many more with laudable success. Urban agriculture is one such activity where communities can prove to make a real difference. Farming activities in cities across different developed countries have proved to have favorable outcomes in the form of increased food security, neighborhood revitalization, health benefits and local economic growth. However, urban agriculture in the developing nations have never been prioritized as an important planning tool to cater to the basic needs of the public. Urban agricultural practices are being carried out in a fragmented fashion without a formal backing. The urban dwellers rely heavily on their far-off rural counterparts for daily food requirements. With the onset of the pandemic and the recurring lockdowns, the significance of geographic proximity and its impact on the availability of food to the public are gradually being realized around the globe. This warrants a need for localized food systems by shortening the distance between production and consumption of food. The significance of communities in realizing these urban farming benefits is explored in this paper. A case-study approach is adopted to understand how different communities have overcome barriers to urban farming in cities. The applicability of these practices is validated against the state of Kerala in India wherein different community centered approaches have been successful in the past. The existing barriers are assessed and way forward to achieve a self-sufficient localized food systems is formulated with the key lessons from the case studies. These recommendations will be helpful to successfully establish and sustain farming activities in urban areas by leveraging the power of communities.

Keywords: community-centric, COVID-19, drivers and barriers, local food system, urban agriculture

Procedia PDF Downloads 138
489 Gendered Economic, Social, and Health Effects of the Mobile Health and Nutritional Services of the International Medical Corps (IMC) in Vulnerable Areas of Ethiopia

Authors: Abdela Zeinu Yasin

Abstract:

The current research aimed to assess the status of IMC in providing treatment for malnourished children and programs in water, sanitation, and hygiene (WASH), food and livelihood security, and comprehensive healthcare through Mobile health and nutrition programs during the last 5 years period. We have conducted 60 in-depth interviews with women during the period from conception to a child’s birthday, health facility staff, and female community health volunteers (FCHVs), as well as 12 focus group discussions with health facility staff and other household decision-makers. We employed thematic analysis using framework matrices and analytical memorandums. The study revealed that 78% of the respondents, of whom 97% were women, have benefited from the selected vulnerable areas. The use of the clear water and sanitization program has reached the 81% of selected households. The use of a modern baby delivery system among the respondent has been 68% of the women and health facilities among the decision-makers/focal person. More than 8 in 10 participants (84%) could read and understand the health facility instructions, and the majority (82%) of women, health facility staff, and male decision-makers can also read and write bulletins and instructions. We found that decision-maker women preferred participative education, whereas health facilities and the IMC desired educational and motivational bulletins. A Mobile Health and Nutrition program intervention by the IMC is acceptable in the conditions of the Ethiopian community and has the potential to improve community health and nutrition service utilization, particularly by providing clean water and sanitization; women’s birth control, and health improvement in the vulnerable regions of the country. The current research findings shall contribute to text IMC Mobile Health and Nutritional intervention design in under-resourced settings.

Keywords: clean water, health and nutrition services, hygiene, IMC, mobile health, sanitation

Procedia PDF Downloads 95
488 Agricultural Investment in Ethiopia: The Case of Oromia Region

Authors: Misganaw Ayele Gelaw

Abstract:

This abstract presents an overview of agricultural investment in Ethiopia, with a focus on the Oromia Region. Ethiopia is a developing country that heavily relies on agriculture as a major contributor to its economic growth and employment. The Oromia Region, located in the central part of the country, is the largest region in Ethiopia and plays a significant role in the agricultural sector. The study aims to explore the current state of agricultural investment in the Oromia Region, focusing on the opportunities, challenges, and potential benefits that arise from such investments. It also highlights the key agricultural investment strategies and policies implemented by the Ethiopian government to attract domestic and foreign investors. To achieve these objectives, a comprehensive literature review and analysis of relevant reports, publications, and government policies will be conducted. The study will also incorporate qualitative and quantitative data collection methods, such as interviews, surveys, and statistical analysis, to provide a well-rounded understanding of agricultural investment dynamics in the Oromia Region. The findings of this study are expected to shed light on the impact of agricultural investments on local farmers, rural development, food security, income generation, and overall economic growth in the Oromia Region. It will also identify the key risk factors and potential mitigations associated with agricultural investment, offering recommendations to policymakers, investors, and stakeholders to improve the effectiveness and sustainability of investment efforts in the region. This abstract highlights the importance of agricultural investment in the Oromia Region and Ethiopia as a whole, as it strives to enhance productivity, increase farmers' income, and contribute to the country's long-term development goals. By understanding the challenges and opportunities associated with agricultural investment, policymakers and investors can develop targeted strategies to ensure inclusive and sustainable growth in the agricultural sector, leading to improved livelihoods and economic prosperity in the Oromia Region.

Keywords: agriculture, investment, agriculture policy, economy

Procedia PDF Downloads 80
487 Molecular Genetic Purity Test Using SSR Markers in Pigeon Pea

Authors: Rakesh C. Mathad, G. Y. Lokesh, Basavegowda

Abstract:

In agriculture using quality seeds of improved varieties is very important to ensure higher productivity thereby food security and sustainability. To ensure good productivity, seeds should have characters as described by the breeder. To know whether the characters as described by the breeder are expressing in a variety such as genuineness or genetic purity, field grow out test (GOT) is done. In pigeon pea which is long durational crop, conducting a GOT may take very long time and expensive also. Since in pigeon pea flower character is a most distinguishing character from the contaminants, conducting a field grow out test require 120-130 days or till flower emergence, which may increase cost of storage and seed production. This will also delay the distribution of seed inventory to the pigeon pea growing areas. In this view during 2014-15 with financial support of Govt. of Karnataka, India, a project to develop a molecular genetic test for newly developed variety of pigeon pea cv.TS3R was commissioned at Seed Unit, UAS, Raichur. A molecular test was developed with the help SSR markers to identify pure variety from possible off types in newly released pigeon pea variety TS3R. In the investigation, 44 primer pairs were screened to identify the specific marker associated with this variety. Pigeon pea cv. TS3R could be clearly identified by using the primer CCM 293 based on the banding pattern resolved on gel electrophoresis and PCR reactions. However some of the markers like AHSSR 46, CCM 82 and CCM 57 can be used to test other popular varieties in the region like Asha, GRG-811 and Maruti respectively. Further to develop this in to a lab test, the seed sample size was standardized to 200 seeds and a grow out matrix was developed. This matrix was used to sample 12 days old leaves to extract DNA. The lab test results were validated with actual field GOT test results and found variations within the acceptable limit of 1%. This molecular method can now be employed to test the genetic purity in pigeon pea cv TS3R which reduces the time and can be a cheaper alternative method for field GOT.

Keywords: genuineness, grow-out matrix, molecular genetic purity, SSR markers

Procedia PDF Downloads 285
486 Exploration of RFID in Healthcare: A Data Mining Approach

Authors: Shilpa Balan

Abstract:

Radio Frequency Identification, also popularly known as RFID is used to automatically identify and track tags attached to items. This study focuses on the application of RFID in healthcare. The adoption of RFID in healthcare is a crucial technology to patient safety and inventory management. Data from RFID tags are used to identify the locations of patients and inventory in real time. Medical errors are thought to be a prominent cause of loss of life and injury. The major advantage of RFID application in healthcare industry is the reduction of medical errors. The healthcare industry has generated huge amounts of data. By discovering patterns and trends within the data, big data analytics can help improve patient care and lower healthcare costs. The number of increasing research publications leading to innovations in RFID applications shows the importance of this technology. This study explores the current state of research of RFID in healthcare using a text mining approach. No study has been performed yet on examining the current state of RFID research in healthcare using a data mining approach. In this study, related articles were collected on RFID from healthcare journal and news articles. Articles collected were from the year 2000 to 2015. Significant keywords on the topic of focus are identified and analyzed using open source data analytics software such as Rapid Miner. These analytical tools help extract pertinent information from massive volumes of data. It is seen that the main benefits of adopting RFID technology in healthcare include tracking medicines and equipment, upholding patient safety, and security improvement. The real-time tracking features of RFID allows for enhanced supply chain management. By productively using big data, healthcare organizations can gain significant benefits. Big data analytics in healthcare enables improved decisions by extracting insights from large volumes of data.

Keywords: RFID, data mining, data analysis, healthcare

Procedia PDF Downloads 235
485 Smart Water Cities for a Sustainable Future: Defining, Necessity, and Policy Pathways for Canada's Urban Water Resilience

Authors: Sima Saadi, Carolyn Johns

Abstract:

The concept of a "Smart Water City" is emerging as a framework to address critical urban water challenges, integrating technology, data, and sustainable management practices to enhance water quality, conservation, and accessibility. This paper explores the definition of a Smart Water City, examines the pressing need for such cities in Canada, and proposes policy pathways for their development. Smart Water Cities utilize advanced monitoring systems, data analytics, and integrated water resources management to optimize water usage, anticipate and mitigate environmental impacts, and engage citizens in sustainable practices. Global examples from regions such as Europe, Asia, and Australia illustrate how Smart Water City models can transform urban water systems by enhancing resilience, improving resource efficiency, and driving economic development through job creation in environmental technology sectors. For Canada, adopting Smart Water City principles could address pressing challenges, including climate-induced water stress, aging infrastructure, and the need for equitable water access across diverse urban and rural communities. Building on Canada's existing water policies and technological expertise, it propose strategic investments in digital water infrastructure, data-driven governance, and community partnerships. Through case studies, this paper offers insights into how Canadian cities could benefit from cross-sector collaboration, policy development, and funding for smart water technology. By aligning national policy with smart urban water solutions, Canada has the potential to lead globally in sustainable water management, ensuring long-term water security and environmental stewardship for its cities and communities.

Keywords: smart water city, urban water resilience, water management technology, sustainable water infrastructure, canada water policy, smart city initiatives

Procedia PDF Downloads 11
484 Efficient Energy Extraction Circuit for Impact Harvesting from High Impedance Sources

Authors: Sherif Keddis, Mohamed Azzam, Norbert Schwesinger

Abstract:

Harvesting mechanical energy from footsteps or other impacts is a possibility to enable wireless autonomous sensor nodes. These can be used for a highly efficient control of connected devices such as lights, security systems, air conditioning systems or other smart home applications. They can also be used for accurate location or occupancy monitoring. Converting the mechanical energy into useful electrical energy can be achieved using the piezoelectric effect offering simple harvesting setups and low deflections. The challenge facing piezoelectric transducers is the achievable amount of energy per impact in the lower mJ range and the management of such low energies. Simple setups for energy extraction such as a full wave bridge connected directly to a capacitor are problematic due to the mismatch between high impedance sources and low impedance storage elements. Efficient energy circuits for piezoelectric harvesters are commonly designed for vibration harvesters and require periodic input energies with predictable frequencies. Due to the sporadic nature of impact harvesters, such circuits are not well suited. This paper presents a self-powered circuit that avoids the impedance mismatch during energy extraction by disconnecting the load until the source reaches its charge peak. The switch is implemented with passive components and works independent from the input frequency. Therefore, this circuit is suited for impact harvesting and sporadic inputs. For the same input energy, this circuit stores 150% of the energy in comparison to a directly connected capacitor to a bridge rectifier. The total efficiency, defined as the ratio of stored energy on a capacitor to available energy measured across a matched resistive load, is 63%. Although the resulting energy is already sufficient to power certain autonomous applications, further optimization of the circuit are still under investigation in order to improve the overall efficiency.

Keywords: autonomous sensors, circuit design, energy harvesting, energy management, impact harvester, piezoelectricity

Procedia PDF Downloads 155
483 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 195
482 China-Pakistan Nexus and Its Implication for India

Authors: Riddhi Chopra

Abstract:

While China’s friendship with a number of countries has waxed and waned over the decades, Sino-Pak relationship is said to have withstood the vicissitudes of larger international politics as well as changes in regional and domestic currents. Pakistan, one of the first countries to recognize the People’s Republic of China, thus providing China with a corridor into the energy rich Muslim states which was reciprocated with a continual stream of no-strings-attached military hardware and defense-related assistance from Beijing. The joint enmity towards India also provided the initial thrust to a burgeoning Sino-Pak friendship. This paper intends to provide a profound analysis of the strategic relation between China-Pakistan and examine India as a determining factor. The Pakistan-China strategic relationship has been conventionally viewed by India as a zero sum game, wherein any gains accrued by Pakistan or China through their partnership is seen as a direct detriment to the evolution of India-Pakistan or India-China relation. The paper evaluates various factors which were crucial for the synthesis of such a strong relation and presents a comprehensive study of the various policies and programs that have been undertaken by the two countries to tie India to South Asia and reduce its sphere of influence. The geographic dynamics is said to breed a natural coalition, dominating the strategic ambitions of both Beijing and Islamabad hence directing their relationship. In addition to the obvious geopolitical factors, there are several dense collaborations between the two nations knitting a relatively close partnership. Moreover, an attempt has been made to assess the irritants in China-Pak relations and the initiatives taken by the two to further strengthen it. Current trends in diplomatic, economic and defense cooperation – along with the staunch affinity rooted in history and consistent geo-strategic interests – points to a strong and strengthening relationship, significant in directing India’s foreign and security policies. This paper seeks to analyze the changing power dynamics of the China-Pak nexus with external actors such as US and India with an ulterior motive of their own and predict the change in power dynamics between the four countries.

Keywords: China, Pakistan, India, strategy

Procedia PDF Downloads 268