Search results for: smart security
1165 Searchable Encryption in Cloud Storage
Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu
Abstract:
Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption
Procedia PDF Downloads 3811164 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 2081163 Dual Thermoresponsive Polyzwitterionic Core-Shell Microgels and Study of Their Anti-Fouling Effect
Authors: P. Saha, R. Ganguly, N. K .Singha, A. Pich
Abstract:
Microgel, a smart class of material, has drawn attention in the past few years due to its response to external stimuli like temperature, pH, and ionic strength of the solution. Among them, one type of polymer becomes soluble, and the other becomes insoluble in water upon heating displaying upper critical solution temperature (UCST) (e.g., polysulfobetaine, PSB) and lower critical solution temperature (LCST) (e.g., poly(N-vinylcaprolactam, PVCL)) respectively. Polyzwitterions, electrically neutral polymers are biocompatible, biodegradable, and non-cytotoxic in nature, and presence of zwitterionic pendant group in the main backbone makes them stable against temperature and pH variations and strong hydration capability in salt solution promotes them to be used as interfacial bio-adhesion resistance material. Majority of zwitterionic microgels have been synthesized in mini- emulsion technique using free radical polymerization approach. Here, a new route to synthesize dual thermo-responsive PVCL microgels decorated with appreciable amount of zwitterionic PSB chains was developed by a purely water-based surfactant-free reversible addition–fragmentation chain transfer (RAFT) precipitation polymerization. PSB macro-RAFTs having different molecular weights were synthesized and utilized for surface-grafting with PVCL microgels varying the macro-RAFT concentration using N,N′-methylenebis(acrylamide) (BIS) as cross-linker. Increasing the PSB concentration in the PVCL microgels resulted in a linear increase in UCST but decrease in hydrodynamic radius due to strong intrachain coulombic attraction forces acting between the opposite charges present in the zwitterionic groups. Anti- fouling effect was observed on addition of BSA protein solution on the microgel-coated membrane surfaces as studied by fluorescence spectrophotoscopy.Keywords: microgels, polyzwitterions, upper critical solution temperature-lower critical solution temperature, UCST-LCST, ionic crosslinking
Procedia PDF Downloads 1151162 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport
Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos
Abstract:
Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform
Procedia PDF Downloads 1751161 Migration and Displacement: A Study on the Impact of Bangladeshi and Nepali Migration to North-Eastern India
Authors: Sri Mahan Borah
Abstract:
The issue of migration and displacement is considered so sensitive that states have often linked it with their sovereignty, independence and even existence. Therefor, even in the era of globalisation no nation-state is ready to compromise with its territorial boundaries. The problem of migration and displacement has generated a range of socio-political, economic, ethnic, and communal tensions in India in general and northeastern States in particular. In such situation it becomes unpreventable to look over the issue so that a viable elucidation may emerge. The present paper is an attempt to understand the impact of Bangladeshi and Nepali migration to North-Eastern states of India through historical and analytical methods. In this course it will look into the emergence of the migration and displacement problem, its causes, impacts on security and other issues of national interest especially when the migration is illegal and poses multi-layered challenges to the Indian state. The nature of migration from these countries to India has been dissimilar. This is because of their different historical backgrounds, geographical variants, ethno-religious affinities, political systems and bilateral arrangements with India. It concludes inter alia that, India’s borders with Bangladesh and Nepal must be regulated and that resident migrants need to be strategically dealt with, keeping in mind age-old relationships with these countries and, more importantly, the nature and construct of our geography.Keywords: migration, displacement, North-East, India
Procedia PDF Downloads 4021160 Developing an Interpretive Plan for Qubbet El-Hawa North Archaeological Site in Aswan, Egypt
Authors: Osama Amer Mohyeldin Mohamed
Abstract:
Qubbet el-Hawa North (QHN) is an example of an archaeological site in West-Aswan and It has not opened to the public yet and has been under excavation since its discovery in 2013 as a result of the illegal digging that happened in many sites in Egypt because of the unstable situation and the absence of security. The site has the potential to be one of the most attractive sites in Aswan. Moreover, it deserves to be introduced to the visitors in a good manner appropriate to its great significance. Both interpretation and presentation are crucial inseparable tools that communicate the archaeological site's significance to the public and raise their awareness. Moreover, it helps them to understand the past and appreciate archaeological assets. People will never learn or see anything from ancient remains unless it is explained. They would only look at it as ancient and charming. They expect a story, and more than knowledge, authenticity, or even supporting preservation actions, they want to enjoy and be entertained. On the other hand, a lot of archaeologists believe that planning an archaeological site for entertaining visitors deteriorates it and affects its authenticity. Thus, it represents a challenge to design a model for visitors’ experience that meets their expectations and needs while safeguarding the site’s integrity. The article presents a proposal for an interpretation plan for the site of Qubbet el-Hawa North.Keywords: heritage interpretation and presentation, archaeological site management, qubbet el-hawa North, local community engagement, accessibility
Procedia PDF Downloads 271159 Assessment of Exploitation Vulnerability of Quantum Communication Systems with Phase Encryption
Authors: Vladimir V. Nikulin, Bekmurza H. Aitchanov, Olimzhon A. Baimuratov
Abstract:
Quantum communication technology takes advantage of the intrinsic properties of laser carriers, such as very high data rates and low power requirements, to offer unprecedented data security. Quantum processes at the physical layer of encryption are used for signal encryption with very competitive performance characteristics. The ultimate range of applications for QC systems spans from fiber-based to free-space links and from secure banking operations to mobile airborne and space-borne networking where they are subjected to channel distortions. Under practical conditions, the channel can alter the optical wave front characteristics, including its phase. In addition, phase noise of the communication source and photo-detection noises alter the signal to bring additional ambiguity into the measurement process. If quantized values of photons are used to encrypt the signal, exploitation of quantum communication links becomes extremely difficult. In this paper, we present the results of analysis and simulation studies of the effects of noise on phase estimation for quantum systems with different number of encryption bases and operating at different power levels.Keywords: encryption, phase distortion, quantum communication, quantum noise
Procedia PDF Downloads 5511158 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis
Authors: F. Felipe
Abstract:
Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.Keywords: air defense, effectiveness, system, simulation, decision-support
Procedia PDF Downloads 1551157 Ethnobotanical Survey on the Use of Herbal Medicine at Children in Algeria
Authors: Metahri Leyla
Abstract:
Herbal medicine is one of the oldest medicines in the world. It constitutes an interesting alternative to treat and cure without creating new diseases. Despite the progress of medicine, the increase in the number of doctors, the creation of social security, many parents have resorted to herbal medicine for their children; they are increasingly asking for "natural remedies", "without risk" for their children. Herbal tea is a very accessible way to enjoy the benefits of herbal medicine. Accordingly; the objective of our study is to obtain detailed information on the composition and mode of administration of these herbal teas and to identify the different plants used; their beneficial effects, as well as their possible toxicity. The current research work represents an ethnobotanical survey spread over one month (from January 6, 2021, to February 19, 2021) carried out by means of an electronic questionnaire concerning 753 respondents involving single or multiparous mothers. The obtained results reveal that a total of 684 mothers used herbal teas for their infants, which revealed the use of 55 herbal remedies for several indications, the most sought after are the carminative effect and relief of colic, and which 9% of users noticed undesirable effects linked to the administration of herbal teas to their infants. As a conclusion, it has been asserted that the use of herbal teas as a natural remedy by Algerian mothers is a widely accepted practice, however, the "natural" nature of the plants does not mean that they are harmless.Keywords: herbal medicine, herbal teas, children, mothers, medicinal plants
Procedia PDF Downloads 1391156 The Iconic Pink Donut Box: An Analysis of Memory and Identity Amongst Cambodian Refugees in California
Authors: Basmah Arshad
Abstract:
In the aftermath of the Cambodian genocide, many refugees resettled in America. They carved out a distinctively Cambodian-American space in California with donut shops, establishing a tight-knit community that worked to achieve ‘the American dream’. Urged by traumatic memories of the genocide and American society directly encouraging (if not demanding) cultural assimilation, these refugees and successive generations continuously worked to re-identify themselves as Americans. Artist Phung Huynh grew up in this context of family-owned donut shops and the frantic scramble for stability and security. It is this community that she depicts in her artwork series from the late 2010s, ‘Khmerican: Drawing on Pink Donut Boxes’. Huynh's artwork challenges dominant Western narratives about the Cambodian genocide by pushing forward images of resilience, resistance, and joy, while also allowing for a discussion about issues of assimilation, identity, and nostalgia in the Cambodian-American community. It also provokes deeply relevant questions about how refugees and immigrants deliberately appropriate elements of the Americana (eg, donuts) to assimilate and re-fashion their identity as a tactic for financial stability and social survival.Keywords: Cambodian diaspora, cultural identity, assimilation, food, artwork
Procedia PDF Downloads 641155 The Role of ICTS in Improving the Quality of Public Spaces in Large Cities of the Third World
Authors: Ayat Ayman Abdelaziz Ibrahim Amayem, Hassan Abdel-Salam, Zeyad El-Sayad
Abstract:
Nowadays, ICTs have spread extensively in everyday life in an unprecedented way. A great attention is paid to the ICTs while ignoring the social aspect. With the immersive invasion of internet as well as smart phones’ applications and digital social networking, people become more socially connected through virtual spaces instead of meeting in physical public spaces. Thus, this paper aims to find the ways of implementing ICTs in public spaces to regain their status as attractive places for people, incite meetings in real life and create sustainable lively city centers. One selected example of urban space in the city center of Alexandria is selected for the study. Alexandria represents a large metropolitan city subjected to rapid transformation. Improving the quality of its public spaces will have great effects on the whole well-being of the city. The major roles that ICTs can play in the public space are: culture and art, education, planning and design, games and entertainment, and information and communication. Based on this classification various examples and proposals of ICTs interventions in public spaces are presented and analyzed to encourage good old fashioned social interaction by creating the New Social Public Place of this Digital Era. The paper will adopt methods such as questionnaire for evaluating the people’s willingness to accept the idea of using ICTs in public spaces, their needs and their proposals for an attractive place; the technique of observation to understand the people behavior and their movement through the space and finally will present an experimental design proposal for the selected urban space. Accordingly, this study will help to find design principles that can be adopted in the design of future public spaces to meet the needs of the digital era’s users with the new concepts of social life respecting the rules of place-making.Keywords: Alexandria sustainable city center, digital place-making, ICTs, social interaction, social networking, urban places
Procedia PDF Downloads 4181154 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka
Authors: Prasansha Kumari
Abstract:
This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.Keywords: compatibility, complexity, mobile banking, observability, risk
Procedia PDF Downloads 2011153 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability
Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai
Abstract:
Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability
Procedia PDF Downloads 2211152 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms
Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez
Abstract:
This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.Keywords: temporal graph network, anomaly detection, cyber security, IDS
Procedia PDF Downloads 1021151 Optimizing Resource Allocation and Indoor Location Using Bluetooth Low Energy
Authors: Néstor Álvarez-Díaz, Pino Caballero-Gil, Héctor Reboso-Morales, Francisco Martín-Fernández
Abstract:
The recent tendency of "Internet of Things" (IoT) has developed in the last years, causing the emergence of innovative communication methods among multiple devices. The appearance of Bluetooth Low Energy (BLE) has allowed a push to IoT in relation to smartphones. In this moment, a set of new applications related to several topics like entertainment and advertisement has begun to be developed but not much has been done till now to take advantage of the potential that these technologies can offer on many business areas and in everyday tasks. In the present work, the application of BLE technology and smartphones is proposed on some business areas related to the optimization of resource allocation in huge facilities like airports. An indoor location system has been developed through triangulation methods with the use of BLE beacons. The described system can be used to locate all employees inside the building in such a way that any task can be automatically assigned to a group of employees. It should be noted that this system cannot only be used to link needs with employees according to distances, but it also takes into account other factors like occupation level or category. In addition, it has been endowed with a security system to manage business and personnel sensitive data. The efficiency of communications is another essential characteristic that has been taken into account in this work.Keywords: bluetooth low energy, indoor location, resource assignment, smartphones
Procedia PDF Downloads 3921150 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics
Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood
Abstract:
We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka
Procedia PDF Downloads 3911149 Powering Profits: A Dynamic Approach to Sales Marketing and Electronics
Authors: Muhammad Awais Kiani, Maryam Kiani
Abstract:
This abstract explores the confluence of these two domains and highlights the key factors driving success in sales marketing for electronics. The abstract begins by digging into the ever-evolving landscape of consumer electronics, emphasizing how technological advancements and the growth of smart devices have revolutionized the way people interact with electronics. This paradigm shift has created tremendous opportunities for sales and marketing professionals to engage with consumers on various platforms and channels. Next, the abstract discusses the pivotal role of effective sales marketing strategies in the electronics industry. It highlights the importance of understanding consumer behavior, market trends, and competitive landscapes and how this knowledge enables businesses to tailor their marketing efforts to specific target audiences. Furthermore, the abstract explores the significance of leveraging digital marketing techniques, such as social media advertising, search engine optimization, and influencer partnerships, to establish brand identity and drive sales in the electronics market. It emphasizes the power of storytelling and creating captivating content to engage with tech-savvy consumers. Additionally, the abstract emphasizes the role of customer relationship management (CRM) systems and data analytics in optimizing sales marketing efforts. It highlights the importance of leveraging customer insights and analyzing data to personalize marketing campaigns, enhance customer experience, and ultimately drive sales growth. Lastly, the abstract concludes by underlining the importance of adapting to the ever-changing landscape of the electronics industry. It encourages businesses to embrace innovation, stay informed about emerging technologies, and continuously evolve their sales marketing strategies to meet the evolving needs and expectations of consumers. Overall, this abstract sheds light on the captivating realm of sales marketing in the electronics industry, emphasizing the need for creativity, adaptability, and a deep understanding of consumers to succeed in this rapidly evolving market.Keywords: marketing industry, electronics, sales impact, e-commerce
Procedia PDF Downloads 731148 Road Accident Blackspot Analysis: Development of Decision Criteria for Accident Blackspot Safety Strategies
Authors: Tania Viju, Bimal P., Naseer M. A.
Abstract:
This study aims to develop a conceptual framework for the decision support system (DSS), that helps the decision-makers to dynamically choose appropriate safety measures for each identified accident blackspot. An accident blackspot is a segment of road where the frequency of accident occurrence is disproportionately greater than other sections on roadways. According to a report by the World Bank, India accounts for the highest, that is, eleven percent of the global death in road accidents with just one percent of the world’s vehicles. Hence in 2015, the Ministry of Road Transport and Highways of India gave prime importance to the rectification of accident blackspots. To enhance road traffic safety and reduce the traffic accident rate, effectively identifying and rectifying accident blackspots is of great importance. This study helps to understand and evaluate the existing methods in accident blackspot identification and prediction that are used around the world and their application in Indian roadways. The decision support system, with the help of IoT, ICT and smart systems, acts as a management and planning tool for the government for employing efficient and cost-effective rectification strategies. In order to develop a decision criterion, several factors in terms of quantitative as well as qualitative data that influence the safety conditions of the road are analyzed. Factors include past accident severity data, occurrence time, light, weather and road conditions, visibility, driver conditions, junction type, land use, road markings and signs, road geometry, etc. The framework conceptualizes decision-making by classifying blackspot stretches based on factors like accident occurrence time, different climatic and road conditions and suggesting mitigation measures based on these identified factors. The decision support system will help the public administration dynamically manage and plan the necessary safety interventions required to enhance the safety of the road network.Keywords: decision support system, dynamic management, road accident blackspots, road safety
Procedia PDF Downloads 1431147 Enhancing Green Infrastructure as a Climate Change Adaptation Strategy in Addis Ababa: Unlocking Institutional, Socio-Cultural and Cognitive Barriers for Application
Authors: Eyasu Markos Woldesemayat, Paolo Vincenzo Genovese
Abstract:
In recent years with an increase in the concentration of Green House Gases (GHG), Climate Change (CC) externalities are mounting, regardless of governments, are scrambling to implement mitigation and adaptation measures. With multiple social, economic and environmental benefits, Green Infrastructure (GI) has evolved as a highly valuable policy tool to promote sustainable development and smart growth by meeting multiple objectives towards quality of life. However, despite the wide range of benefits, it's uptake in African cities such as Addis Ababa is very low due to several constraining factors. This study, through content analysis and key informant interviews, examined barriers for the uptake of GI among spatial planners in Addis Ababa. Added to this, the study has revealed that the spatial planners had insufficient knowledge about GI planning principles such as multi-functionality, integration, and connectivity, and multiscale. The practice of implementing these holistic principles in urban spatial planning is phenomenally nonexistent. The findings also revealed 20 barriers categorized under four themes, i.e., institutional, socio-cultural, resource, and cognitive barriers. Similarly, it was identified that institutional barriers (0.756), socio-cultural barriers (0.730), cognitive barriers (0.700) and resource barriers (0.642), respectively, are the foremost impending factors for the promotion of GI in Addis Ababa. It was realized that resource barriers were the least constraining factor for enshrining the GI uptake in the city. Strategies to hasten the adoption of GI in the city mainly focus on improving political will, harmonization sectorial plans, improve spatial planning and implementation practice, prioritization of GI in all planning activities, enforcement of environmental laws, introducing collaborative GI governance, creating strong and stable institutions and raising awareness on the need to conserve environment and CC externalities through education and outreach mechanisms.Keywords: Addis Ababa, climate change, green infrastructure, spatial planning, spatial planners
Procedia PDF Downloads 1201146 Study of the Phenomenon of Collapse and Buckling the Car Body Frame
Authors: Didik Sugiyanto
Abstract:
Conditions that often occur in the framework of a particular vehicle at a car is a collision or collision with another object, an example of such damage is to the frame or chassis for the required design framework that is able to absorb impact energy. Characteristics of the material are influenced by the value of the stiffness of the material that need to be considered in choosing the material properties of the material. To obtain material properties that can be adapted to the experimental conditions tested the tensile and compression testing. In this study focused on the chassis at an angle of 150, 300, and 450. It is based on field studies that vehicle primarily for freight cars have a point of order light between 150 to 450. Research methods include design tools, design framework, procurement of materials and experimental tools, tool-making, the manufacture of the test framework, and the testing process, experiment is testing the power of the press to know the order. From this test obtained the maximum force on the corner of 150 was 569.76 kg at a distance of 16 mm, angle 300 is 370.3 kg at a distance of 15 mm, angle 450 is 391.71 kg at a distance of 28 mm. After reaching the maximum force the order will occur collapse, followed by a decrease in the next distance. It can be concluded that the greatest strain energy occurs at an angle of 150. So it is known that the frame at an angle of 150 produces the best level of security.Keywords: buckling, collapse, body frame, vehicle
Procedia PDF Downloads 5771145 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves
Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura
Abstract:
People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.Keywords: elderly person, IoT device, Raspberry Pi, watch-over system
Procedia PDF Downloads 2211144 ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad
Authors: Spyridon Plakoudas
Abstract:
After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best.Keywords: ISIS, cyber-jihad, Syrian Civil War, cyber-terrorism, insurgency and counter-insurgency
Procedia PDF Downloads 1311143 Implications of Agricultural Subsidies Since Green Revolution: A Case Study of Indian Punjab
Authors: Kriti Jain, Sucha Singh Gill
Abstract:
Subsidies have been a major part of agricultural policies around the world, and more extensively since the green revolution in developing countries, for the sake of attaining higher agricultural productivity and achieving food security. But entrenched subsidies lead to distorted incentives and promote inefficiencies in the agricultural sector, threatening the viability of these very subsidies and sustainability of the agricultural production systems, posing a threat to the livelihood of farmers and laborers dependent on it. This paper analyzes the economic and ecological sustainability implications of prolonged input and output subsidies in agriculture by studying the case of Indian Punjab, an agriculturally developed state responsible for ensuring food security in the country when it was facing a major food crisis. The paper focuses specifically on the environmentally unsustainable cropping pattern changes as a result of Minimum Support Price (MSP) and assured procurement and on the resource use efficiency and cost implications of power subsidy for irrigation in Punjab. The study is based on an analysis of both secondary and primary data sources. Using secondary data, a time series analysis was done to capture the changes in Punjab’s cropping pattern, water table depth, fertilizer consumption, and electrification of agriculture. This has been done to examine the role of price and output support adopted to encourage the adoption of green revolution technology in changing the cropping structure of the state, resulting in increased input use intensities (especially groundwater and fertilizers), which harms the ecological balance and decreases factor productivity. Evaluation of electrification of Punjab agriculture helped evaluate the trend in electricity productivity of agriculture and how free power imposed further pressure on the extant agricultural ecosystem. Using data collected from a primary survey of 320 farmers in Punjab, the extent of wasteful application of groundwater irrigation, water productivity of output, electricity usage, and cost of irrigation driven electricity subsidy to the exchequer were estimated for the dominant cropping pattern amongst farmers. The main findings of the study revealed how because of a subsidy has driven agricultural framework, Punjab has lost area under agro climatically suitable and staple crops and moved towards a paddy-wheat cropping system, that is gnawing away the state’s natural resources like water table has been declining at a significant rate of 25 cms per year since 1975-76, and excessive and imbalanced fertilizer usage has led to declining soil fertility in the state. With electricity-driven tubewells as the major source of irrigation within a regime of free electricity and water-intensive crop cultivation, there is both wasteful application of irrigation water and electricity in the cultivation of paddy crops, burning an unproductive hole in the exchequer’s pocket. There is limited access to both agricultural extension services and water-conserving technology, along with policy imbalance, keeping farmers in an intensive and unsustainable production system. Punjab agriculture is witnessing diminishing returns to factor, which under the business-as-usual scenario, will soon enter the phase of negative returns to factor.Keywords: cropping pattern, electrification, subsidy, sustainability
Procedia PDF Downloads 1841142 Content Based Video Retrieval System Using Principal Object Analysis
Authors: Van Thinh Bui, Anh Tuan Tran, Quoc Viet Ngo, The Bao Pham
Abstract:
Video retrieval is a searching problem on videos or clips based on content in which they are relatively close to an input image or video. The application of this retrieval consists of selecting video in a folder or recognizing a human in security camera. However, some recent approaches have been in challenging problem due to the diversity of video types, frame transitions and camera positions. Besides, that an appropriate measures is selected for the problem is a question. In order to overcome all obstacles, we propose a content-based video retrieval system in some main steps resulting in a good performance. From a main video, we process extracting keyframes and principal objects using Segmentation of Aggregating Superpixels (SAS) algorithm. After that, Speeded Up Robust Features (SURF) are selected from those principal objects. Then, the model “Bag-of-words” in accompanied by SVM classification are applied to obtain the retrieval result. Our system is performed on over 300 videos in diversity from music, history, movie, sports, and natural scene to TV program show. The performance is evaluated in promising comparison to the other approaches.Keywords: video retrieval, principal objects, keyframe, segmentation of aggregating superpixels, speeded up robust features, bag-of-words, SVM
Procedia PDF Downloads 2991141 Hydro-Gravimetric Ann Model for Prediction of Groundwater Level
Authors: Jayanta Kumar Ghosh, Swastik Sunil Goriwale, Himangshu Sarkar
Abstract:
Groundwater is one of the most valuable natural resources that society consumes for its domestic, industrial, and agricultural water supply. Its bulk and indiscriminate consumption affects the groundwater resource. Often, it has been found that the groundwater recharge rate is much lower than its demand. Thus, to maintain water and food security, it is necessary to monitor and management of groundwater storage. However, it is challenging to estimate groundwater storage (GWS) by making use of existing hydrological models. To overcome the difficulties, machine learning (ML) models are being introduced for the evaluation of groundwater level (GWL). Thus, the objective of this research work is to develop an ML-based model for the prediction of GWL. This objective has been realized through the development of an artificial neural network (ANN) model based on hydro-gravimetry. The model has been developed using training samples from field observations spread over 8 months. The developed model has been tested for the prediction of GWL in an observation well. The root means square error (RMSE) for the test samples has been found to be 0.390 meters. Thus, it can be concluded that the hydro-gravimetric-based ANN model can be used for the prediction of GWL. However, to improve the accuracy, more hydro-gravimetric parameter/s may be considered and tested in future.Keywords: machine learning, hydro-gravimetry, ground water level, predictive model
Procedia PDF Downloads 1251140 Small Businesses as Vehicles for Job Creation in North-West Nigeria
Authors: Mustapha Shitu Suleiman, Francis Neshamba, Nestor Valero-Silva
Abstract:
Small businesses are considered as engine of economic growth, contributing to employment generation, wealth creation, and poverty alleviation and food security in both developed and developing countries. Nigeria is facing many socio-economic problems and it is believed that by supporting small business development, as propellers of new ideas and more effective users of resources, often driven by individual creativity and innovation, Nigeria would be able to address some of its economic and social challenges, such as unemployment and economic diversification. Using secondary literature, this paper examines the role small businesses can play in the creation of jobs in North-West Nigeria to overcome issues of unemployment, which is the most devastating economic challenge facing the region. Most studies in this area have focused on Nigeria as a whole and only a few studies provide a regional focus, hence, this study will contribute to knowledge by filling this gap by concentrating on North-West Nigeria. It is hoped that with the present administration’s determination to improve the economy, small businesses would be used as vehicles for diversification of the economy away from crude oil to create jobs that would lead to a reduction in the country’s high unemployment level.Keywords: job creation, north-west, Nigeria, small business, unemployment
Procedia PDF Downloads 3051139 Different Approaches to the Study of Territorial Dispute between China and India
Authors: Albina Muratbekova
Abstract:
One of the main tensions and challenges in the development of Sino-Indian relation is the demarcation of its frontiers. The fact that throughout the history borders had never been demarcated on ground occur a dispute between China and India after receiving sovereignty. Boundaries of India and China are divided into three sectors: Eastern, Middle and Western. The middle sector runs from India’s Uttar Pradesh to the Punjab, 545 km length of the Line of Actual Control, the lines of which was confirmed at the 9th meeting of the Expert Group held in 2001, in New Delhi. Other two sectors are still not determined and cause disputes. A western sector of the frontier is the Aksai Chin plateau, covers areas of Ladakh, Tibet, and Sinkiang. Another disputed area lies in the Eastern sector in the Himalayan region, which after 1986 became the Indian state called Arunachal Pradesh. There are two different approaches in the ways of resolving the border dispute. Chinese side keeps an opinion that the border dispute must be resolved in a timely matter unless it is favorable for China, the resolution can be left to a later generation. While India’s government due to security reasons is eager to demarcate the border. In order to study this conflict was used as a descriptive-comparative-analytical method. Also, it was done a profound analyze of conflict nature.Keywords: border dispute, China, India, territorial claim
Procedia PDF Downloads 3061138 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques
Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar
Abstract:
This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI
Procedia PDF Downloads 941137 Differential Impacts of Whole-Growth-Duration Warming on the Grain Yield and Quality between Early and Late Rice
Authors: Shan Huang, Guanjun Huang, Yongjun Zeng, Haiyuan Wang
Abstract:
The impacts of whole-growth warming on grain yield and quality in double rice cropping systems still remain largely unknown. In this study, a two-year field whole-growth warming experiment was conducted with two inbred indica rice cultivars (Zhongjiazao 17 and Xiangzaoxian 45) for early season and two hybrid indica rice cultivars (Wanxiangyouhuazhan and Tianyouhuazhan) for late season. The results showed that whole-growth warming did not affect early rice yield but significantly decreased late rice yield, which was caused by the decreased grain weight that may be related to the increased plant respiration and reduced translocation of dry matter accumulated during the pre-heading phase under warming. Whole-growth warming improved the milling quality of late rice but decreased that of early rice; however, the chalky rice rate and chalkiness degree were increased by 20.7% and 33.9% for early rice and 37.6 % and 51.6% for late rice under warming, respectively. We found that the crude protein content of milled rice was significantly increased by warming in both early and late rice, which would result in deterioration of eating quality. Besides, compared with the control treatment, the setback of late rice was significantly reduced by 17.8 % under warming, while that of early rice was not significantly affected by warming. These results suggest that the negative impacts of whole-growth warming on grain quality may be more severe in early rice than in late rice. Therefore, adaptation in both rice breeding and agronomic practices is needed to alleviate climate warming on the production of a double rice cropping system. Climate-smart agricultural practices ought to be implemented to mitigate the detrimental effects of warming on rice grain quality. For instance, fine-tuning the application rate and timing of inorganic nitrogen fertilizers, along with the introduction of organic amendments and the cultivation of heat-tolerant rice varieties, can help reduce the negative impact of rising temperatures on rice quality. Furthermore, to comprehensively understand the influence of climate warming on rice grain quality, future research should encompass a wider range of rice cultivars and experimental sites.Keywords: climate warming, double rice cropping, dry matter, grain quality, grain yield
Procedia PDF Downloads 361136 Jordan Water District Interactive Billing and Accounting Information System
Authors: Adrian J. Forca, Simeon J. Cainday III
Abstract:
The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.Keywords: accounting, bill, information system, interactive
Procedia PDF Downloads 248