Search results for: Nane Pothier
9 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 1398 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability
Procedia PDF Downloads 1077 Modern Work Modules in Construction Practice
Authors: Robin Becker, Nane Roetmann, Manfred Helmus
Abstract:
Construction companies lack junior staff for construction management. According to a nationwide survey of students, however, the profession lacks attractiveness. The conflict between the traditional job profile and the current desires of junior staff for contemporary and flexible working models must be resolved. Increasing flexibility is essential for the future viability of small and medium-sized enterprises. The implementation of modern work modules can help here. The following report will present the validation results of the developed work modules in construction practice.Keywords: modern construction management, construction industry, work modules, shortage of junior staff, sustainable personnel management, making construction management more attractive, working time model
Procedia PDF Downloads 866 Iron Extraction from Bog Iron Ore in Early French Colonial America
Authors: Yves Monette, Brad Loewen, Louise Pothier
Abstract:
This study explores the first bog iron ore extraction activities which took place in colonial New France. Archaeological excavations carried on the founding site of Montreal in the last ten years have revealed the remains of Fort Ville-Marie erected in 1642. In a level related to the fort occupation between 1660 and 1680, kilos of scories, a dozen of half-finished iron artefacts and a light yellow clayey ore material have recovered that point to extractive metallurgy activities at the fort. Examples of scories, artefacts and of a possible bog iron ore were submitted to SEM-EDS analysis. The results clearly indicate that iron was extracted from local limonite ores in a bloomery. We discovered that the gangue material could be traced from the ore to the scories. However, some lime silicates and some accessory minerals found in the scories, like barite and celestine for example, were absent from the ore but present in dolomite fragments found in the same archaeological context. The tracing of accessory minerals suggests that the ironmaster introduced a lime flux in the bloomery charge to maximize the separation of the iron ore. Before the introduction of the blast furnace in Western Europe during the first half of the 18th Century, the use of fluxes in iron bloomery was not a common practice.Keywords: bog iron ore, extractive metallurgy, French colonial America, Montreal, scanning electron microscopy (SEM)
Procedia PDF Downloads 3545 Heading for Modern Construction Management: Recommendation for Employers
Authors: Robin Becker, Maike Eilers, Nane Roetmann, Manfred Helmus
Abstract:
The shortage of junior staff in the construction industry is a problem that will be further exacerbated in the coming years by the retirement of the baby-boom generations (1955-1969) from employment. In addition, the current working conditions in the field of construction management are not attractive for young professionals. A survey of students revealed a desire for an increase in flexibility and an improved work-life balance in everyday working life. Students of civil engineering and architecture are basically interested in a career in construction management but have reservations due to the image of the profession and the current working conditions. A survey among experts from the construction industry shows that the profession can become more attractive. This report provides recommendations for action in the form of working modules to improve the working conditions of employees. If these are taken into account, graduates can be attracted to the profession of construction management, and existing staff can be retained more effectively. The aim of this report is to show incentives for employers to respond to the wishes and needs of their current and future employees to the extent that can be implemented.Keywords: modern construction management, construction industry, work modules, shortage of junior staff, sustainable personnel management, making construction management more attractive, working time model
Procedia PDF Downloads 834 Validation of Modern Work Modules and Their Impact on Sustainable Human Resource Management in the Construction Industry
Authors: Robin Becker, Nane Roetmann, Manfred Helmus
Abstract:
The construction industry faces a significant challenge due to a shortage of skilled work-ers, especially in construction management, despite an increase in graduates. This is main-ly because the job is associated with high stress, long hours, and poor work-life balance. A survey revealed that the profession is unattractive to students, who prioritize personal growth, flexibility, and digitalization in their careers. To address this issue, companies can consider implementing various work modules like "working time documentation," "home office," "job sharing," and "time off." These modules can improve control, work-life bal-ance, and efficiency if tailored to the company's framework. They offer a way to make the field more appealing to future employees while benefiting existing staff, provided that both employers and employees are flexible and considerate of project-specific conditions and teams. The feasibility of these models depends on the company's overall framework, with potential for cost-neutral implementation and positive effects on efficiency and men-tal health. However, their success also relies on the specific context of the company, and more data is needed to assess their full impact.Keywords: modern construction management, construction industry, work modules, shortage of junior staff, sustainable personnel management, making construction management more attractive, working time model
Procedia PDF Downloads 413 Braille Code Matrix
Authors: Mohammed E. A. Brixi Nigassa, Nassima Labdelli, Ahmed Slami, Arnaud Pothier, Sofiane Soulimane
Abstract:
According to the world health organization (WHO), there are almost 285 million people with visual disability, 39 million of these people are blind. Nevertheless, there is a code for these people that make their life easier and allow them to access information more easily; this code is the Braille code. There are several commercial devices allowing braille reading, unfortunately, most of these devices are not ergonomic and too expensive. Moreover, we know that 90 % of blind people in the world live in low-incomes countries. Our contribution aim is to concept an original microactuator for Braille reading, as well as being ergonomic, inexpensive and lowest possible energy consumption. Nowadays, the piezoelectric device gives the better actuation for low actuation voltage. In this study, we focus on piezoelectric (PZT) material which can bring together all these conditions. Here, we propose to use one matrix composed by six actuators to form the 63 basic combinations of the Braille code that contain letters, numbers, and special characters in compliance with the standards of the braille code. In this work, we use a finite element model with Comsol Multiphysics software for designing and modeling this type of miniature actuator in order to integrate it into a test device. To define the geometry and the design of our actuator, we used physiological limits of perception of human being. Our results demonstrate in our study that piezoelectric actuator could bring a large deflection out-of-plain. Also, we show that microactuators can exhibit non uniform compression. This deformation depends on thin film thickness and the design of membrane arm. The actuator composed of four arms gives the higher deflexion and it always gives a domed deformation at the center of the deviceas in case of the Braille system. The maximal deflection can be estimated around ten micron per Volt (~ 10µm/V). We noticed that the deflection according to the voltage is a linear function, and this deflection not depends only on the voltage the voltage, but also depends on the thickness of the film used and the design of the anchoring arm. Then, we were able to simulate the behavior of the entire matrix and thus display different characters in Braille code. We used these simulations results to achieve our demonstrator. This demonstrator is composed of a layer of PDMS on which we put our piezoelectric material, and then added another layer of PDMS to isolate our actuator. In this contribution, we compare our results to optimize the final demonstrator.Keywords: Braille code, comsol software, microactuators, piezoelectric
Procedia PDF Downloads 3562 Modeling of an Insulin Mircopump
Authors: Ahmed Slami, Med El Amine Brixi Nigassa, Nassima Labdelli, Sofiane Soulimane, Arnaud Pothier
Abstract:
Many people suffer from diabetes, a disease marked by abnormal levels of sugar in the blood; 285 million people have diabetes, 6.6% of the world adult population (in 2010), according to the International Diabetes Federation. Insulin medicament is invented to be injected into the body. Generally, the injection requires the patient to do it manually. However, in many cases he will be unable to inject the drug, saw that among the side effects of hyperglycemia is the weakness of the whole body. The researchers designed a medical device that injects insulin too autonomously by using micro-pumps. Many micro-pumps of concepts have been investigated during the last two decades for injecting molecules in blood or in the body. However, all these micro-pumps are intended for slow infusion of drug (injection of few microliters by minute). Now, the challenge is to develop micro-pumps for fast injections (1 microliter in 10 seconds) with accuracy of the order of microliter. Recently, studies have shown that only piezoelectric actuators can achieve this performance, knowing that few systems at the microscopic level were presented. These reasons lead us to design new smart microsystems injection drugs. Therefore, many technological advances are still to achieve the improvement of materials to their uses, while going through their characterization and modeling action mechanisms themselves. Moreover, it remains to study the integration of the piezoelectric micro-pump in the microfluidic platform features to explore and evaluate the performance of these new micro devices. In this work, we propose a new micro-pump model based on piezoelectric actuation with a new design. Here, we use a finite element model with Comsol software. Our device is composed of two pumping chambers, two diaphragms and two actuators (piezoelectric disks). The latter parts will apply a mechanical force on the membrane in a periodic manner. The membrane deformation allows the fluid pumping, the suction and discharge of the liquid. In this study, we present the modeling results as function as device geometry properties, films thickness, and materials properties. Here, we demonstrate that we can achieve fast injection. The results of these simulations will provide quantitative performance of our micro-pumps. Concern the spatial actuation, fluid rate and allows optimization of the fabrication process in terms of materials and integration steps.Keywords: COMSOL software, piezoelectric, micro-pump, microfluidic
Procedia PDF Downloads 3421 The Role of Social Media in the Success or Failure of a Revolution: A Comparative Case Study of 2008/2018 Revolutions in Armenia
Authors: Nane Giloyan
Abstract:
The rapid development of social networks in the 21st century increases the interests towards the role and impact of social media on the success or failure of a revolution. Even though studies are investigating the role of social media on the outcome of a revolution, still, the conclusions on this matter are ambiguous so far. Hence, this research aims to investigate the role of social media in the success or failure of a revolution and make a contribution to the literature gap. The study aims to examine the research question whether the use of social media explains the success or failure of revolutions in 2008 and 2018 in Armenia. The research question is investigated through content analysis of two cases; failed revolution in 2008 and the successful revolution in 2018 in Armenia. The secondary data analysis was based on information devoted to two revolutions using local and major international news articles, journal and critical articles, in Armenian, Russian and English, also videos, posts and live streams of the revolutionary leaders. There can be many factors explaining the success or failure of a revolution. However, the investigation of the factors and their role to explain the outcome of a revolution other than the use of social media is beyond the scope of this research study. The study holds other variables constant and concludes that in the cases of 2008 and 2018 revolutions in Armenia the mobilization of society through social media explains the differences in the outcomes (failed or successful). The comparative case study of the revolutions in 2008 and 2018 in Armenia emphasizes the important role and impact of the use of social media on the success or failure of a revolution. The results highlight that the use of the Internet, particularly social media and live streams, by the opposition was the essential difference between two revolutions. Social media platforms, live streams, and communication apps that were absent in the revolutionary situation in 2008 were fundamental to the Armenian Velvet Revolution in 2018. The changes in the situation in favor of the opposition, so the outcome of the protests, were mainly based on the Internet-based mobilization of the society. It is also important to take into consideration that the country experienced a great increase in penetration rates over the decade. The percentage of access to the Internet drastically increased between 2008 and 2018. This fact may help to have a clearer understanding of the use of the Internet and social media by the opposition and the reliance on social media by society. According to the results of the continent analysis, the use of social media to direct the protests and to mobilize the society, have a vital role and positive impact on the outcome of a revolution. Thus the study concludes that it is the use of social media to initiate, organize, and direct the protests that explain the success or failure of two Armenian revolutions.Keywords: social media, revolution, Armenia, success, failure
Procedia PDF Downloads 129