Search results for: building security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6424

Search results for: building security

6154 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 341
6153 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 345
6152 An Analysis of Transition in Building Form from Abolition of Diagonal Plane Control by Street Width: Focusing on Site Plan and Urban Block

Authors: Joohyun Park, Jin Baek

Abstract:

The purpose of this study is to Analyze the role and effect arise from Diagonal Plane Control by Street Width (DPCSW) in Architecture in Seoul, and to predict the aspect of transition about the relationship among buildings and Urban morphology After the abolition. To find the tendency of building shape regulation, This study review Building Acts concerned with form making (the building to land Ratio, building designated line, wall designated line, building height limit (DPCSW) and etc.) and simulate the shape of urban blocks made by Acts in drawings. The review results show DPCSW is not only limitation about height, but also making the building setback from road and make the Road broader. And it makes the typical shape of the urban block that buildings are moving away from surrounding road After the Abolition of DPCSW; it is expected by the legislature that domestic real estate’s market would be promoted by increased total floor areas in each building. Some substitution from the legislature is announced, but it just deals with Building Maximum unit by Block unit except the regulation about arrangement in urban Figure and Ground. In conclusion, refrain from the uncontrolled development of city, It is important to make regulation about not only height factors but limitation line in land. Furthermore, through revising District Unit Plan, It is positively necessary to reset the relationship between buildings for the making the city space better.

Keywords: diagonal plane control by street width, building maximum height, district unit plan, building acts, urban block type, morphology, building shape

Procedia PDF Downloads 284
6151 Clay Palm Press: A Technique of Hand Building in Ceramics for Developing Conceptual Forms

Authors: Okewu E. Jonathan

Abstract:

There are several techniques of production in the field of ceramics. These different techniques overtime have been categorised under three methods of production which includes; casting, throwing and hand building. Hand building method of production is further broken down into other techniques and they include coiling, slabbing and pinching. Ceramic artists find the different hand building techniques to be very interesting, practicable and rewarding. This has encouraged ceramic artist in their various studios at different levels to experiment for further hand building techniques that could be unique and unusual. The art of “Clay Palm Press” is a development from studio experiment in a quest for uniqueness in conceptual ceramic practise. Clay palm press is a technique that requires no formal tutelage but at the same time, it is not easily comprehensible when viewed. It is a practice of putting semi-solid clay in the palm and inserting a closed fist pressure so as to take the imprint of the human palm. This clay production from the palm when dried, fired and explored into an art, work reveals an absolute awesomeness of what the palm imprint could result in.

Keywords: ceramics, clay palm press, conceptual forms, hand building, technique

Procedia PDF Downloads 245
6150 A Study on the Wind Energy Produced in the Building Skin Using Piezoelectricity

Authors: Sara Mota Carmo

Abstract:

Nowadays, there is an increasing demand for buildings to be energetically autonomous through energy generation systems from renewable sources, according to the concept of a net zero energy building (NZEB). In this sense, the present study aims to study the integration of wind energy through piezoelectricity applied to the building skin. As a methodology, a reduced-scale prototype of a building was developed and tested in a wind tunnel, with the four façades monitored by recording the energy produced by each. The applied wind intensities varied between 2m/s and 8m/s and the four façades were compared with each other regarding the energy produced according to the intensity of wind and position in the wind. The results obtained concluded that it was not a sufficient system to generate sources to cover family residential buildings' energy needs. However, piezoelectricity is expanding and can be a promising path for a wind energy system in architecture as a complement to other renewable energy sources.

Keywords: adaptative building skin, kinetic façade, wind energy in architecture, NZEB

Procedia PDF Downloads 36
6149 A Design Decision Framework for Net-Zero Carbon Buildings in Hot Climates: A Modeled Approach and Expert’s Feedback

Authors: Eric Ohene, Albert P. C. Chan, Shu-Chien HSU

Abstract:

The rising building energy consumption and related carbon emissions make it necessary to construct net-zero carbon buildings (NZCBs). The objective of net-zero buildings has raised the benchmark for building performance and will alter how buildings are designed and constructed. However, there have been growing concerns about uncertainty in net-zero building design and cost implications in decision-making. Lessons from practice have shown that a robust net-zero building design is complex, expensive, and time-consuming. Moreover, climate conditions have an enormous implication for choosing the best-optimal passive and active solutions to ensure building energy performance while ensuring the indoor comfort performance of occupants. It is observed that 20% of the design decisions made in the initial design phase influence 80% of all design decisions. To design and construct NZCBs, it is crucial to ensure adequate decision-making during the early design phases. Therefore, this study aims to explore practical strategies to design NZCBs and to offer a design framework that could help decision-making during the design stage of net-zero buildings. A parametric simulation approach was employed, and experts (i.e., architects, building designers) perspectives on the decision framework were solicited. The study could be helpful to building designers and architects to guide their decision-making during the design stage of NZCBs.

Keywords: net-zero, net-zero carbon building, energy efficiency, parametric simulation, hot climate

Procedia PDF Downloads 70
6148 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 399
6147 Contributing Factors to Building Failures and Defects in the Nigerian Construction Industry

Authors: Ndibarafinia Tobin

Abstract:

Building defect and failure are common phenomena in the Nigerian construction industry. The activities of the inexperienced labor force in the Nigerian construction industry have tarnished the image of practicing construction professionals in recent past. Defects and collapse can cause unnecessary expenditure, delays, loss of lives, property and left many people injured. They are also generating controversies among parties involved. Also, if this situation is left unanswered and untreated, it will lead to more serious problems in the future upcoming construction projects in Nigeria. Quite a number of factors are responsible for collapse of high-rise, reinforced concrete buildings in Nigeria. Government, professional bodies and stakeholders are asking countless questions as to who should be responsible and how solutions could be proffered. Therefore this study is aimed to identify the contributing factors to high-rise buildings defects and failures in Nigeria, which frequently occur in construction project in order to minimize time and cost and also the roles of professionals and other participants play in the industry in terms of the use of building materials, placement and curing of concrete, modification in the use of a building, collapse of building induced by fire and other causes. The data is collected from questionnaire from various players in construction industry in Nigeria. This study is succeeds in identifying the causes of building failure and also suggesting possible measures to be taken by government and other regulatory bodies in the building industry to avert this and also improve the effectiveness of managing appraisal process of failures and defects in the future.

Keywords: building defects, building failures, Nigerian construction industry, professionals

Procedia PDF Downloads 268
6146 The Effect of Collapse Structure on Economic Growth and Influence of Soil Investigation

Authors: Fatai Shola Afolabi

Abstract:

The study identified and evaluates the causes of building failure and examined the effects of building failure with respect to cost in Lagos State, Nigeria. The method employed in the collection of data includes the administration of questionnaire to professionals in the construction industry and case studies for the sites. A purposive sampling technique was used for selecting the sites visited, and selecting the construction professionals. Descriptive statistical techniques such as frequency distribution and percentages and mean response analysis were used to analyze data. The study revealed that the major causes of building failures were bad design, faulty construction, over loading, non-possession of approved drawings, Possession of approved drawings but non-compliance, and the use of quarks. In the two case studies considered, the total direct loss to the building owners was thirty eight million three hundred and eight five thousand, seven hundred and twenty one naira (38,385,721) which is about One hundred and ninety four thousand, eighty hundred and fifty one dollars ($194,851) at one hundred and ninety seven naira to one US dollars, central bank Nigeria of exchange rate as at 14th March, 2015.

Keywords: building structures, building failure, building collapse, structural failure, cost, direct loss

Procedia PDF Downloads 233
6145 Applying ASHRAE Standards on the Hospital Buildings of UAE

Authors: Hanan M. Taleb

Abstract:

Energy consumption associated with buildings has a significant impact on the environment. To that end, and as a transaction between the inside and outside and between the building and urban space, the building skin plays an especially important role. It provides protection from the elements; demarcates private property and creates privacy. More importantly, it controls the admission of solar radiation. Therefore, designing the building skin sustainably will help to achieve optimal performance in terms of both energy consumption and thermal comfort. Unfortunately, with accelerating construction expansion, many recent buildings do not pay attention to the importance of the envelope design. This piece of research will highlight the importance of this part of the creation of buildings by providing evidence of a significant reduction in energy consumption if the envelopes are redesigned. Consequently, the aim of this paper is to enhance the performance of the hospital envelope in order to achieve sustainable performance. A hospital building sited in Abu Dhabi, in the UAE, has been chosen to act as a case study. A detailed analysis of the annual energy performance of the case study will be performed with the use of a computerised simulation; this is in order to explore their energy performance shortcomings. The energy consumption of the base case will then be compared with that resulting from the new proposed building skin. The results will inform architects and designers of the savings potential from various strategies.

Keywords: ASHREA, building skin, building envelopes, hospitals, Abu Dhabi, UAE, IES software

Procedia PDF Downloads 330
6144 3D Visualization for the Relationship of the Urban Rule and Building Form by Using CityEngine

Authors: Chin Ku, Han liang Lin

Abstract:

The purpose of this study is to visualize how the rule related to urban design influences the building form by 3D modeling software CityEngine. In order to make the goal of urban design clearly connect to urban form, urban planner or designer should understand how the rule affects the form, especially the building form. In Taiwan, the rule pertained to urban design includes traditional zoning, urban design review and building codes. However, zoning cannot precisely expect the outcome of building form and lack of thinking about public realm and 3D form. In addition to that, urban design review is based on case by case, do not have a comprehensive regulation plan and the building code is just for general regulation. Therefore, rule cannot make the urban form reach the vision or goal of the urban design. Consequently, another kind of zoning called Form-based code (FBC) has arisen. This study uses the component of FBC which pertained to urban fabric such as street width, block and plot size, etc., to be the variants of building form, and find out the relationship between the rule and building form. There are three stages of this research, it will start from a field survey of Taichung City in Taiwan to induce the rule-building form relationship by using cluster analysis and descriptive Statistics. Second, visualize the relationship through the parameterized and codified process in CityEngine which is the procedural modeling, and can analyze, monitor and visualize the 3D world. Last, compare the CityEngine result with real world to examine how extent do this model represent the real world appearance.

Keywords: 3D visualization, CityEngine, form-based code, urban form

Procedia PDF Downloads 519
6143 Challenges in Adopting 3R Concept in the Heritage Building Restoration

Authors: H. H. Goh, K. C. Goh, T. W. Seow, N. S. Said, S. E. P. Ang

Abstract:

Malaysia is rich with historic buildings, particularly in Penang and Malacca states. Restoration activities are increasingly important as these states are recognized under UNESCO World Heritage Sites. Restoration activities help to maintain the uniqueness and value of a heritage building. However, increasing in restoration activities has resulted in large quantities of waste. To cope with this problem, the 3R concept (reduce, reuse and recycle) is introduced. The 3R concept is one of the waste management hierarchies. This concept is still yet to apply in the building restoration industry compared to the construction industry. Therefore, this study aims to promote the 3R concept in the heritage building restoration industry. This study aims to examine the importance of 3R concept and to identify challenges in applying the 3R concept in the heritage building restoration industry. This study focused on contractors and consultants who are involved in heritage restoration projects in Penang. Literature review and interviews helps to reach the research objective. Data that obtained is analyzed by using content analysis. For the research, application of 3R concept is important to conserve natural resources and reduce pollution problems. However, limited space to organise waste is the obstruction during the implementation of this concept. In conclusion, the 3R concept plays an important role in promoting environmental conservation and helping in reducing the construction waste

Keywords: 3R Concept, heritage building, restoration activities, building science

Procedia PDF Downloads 283
6142 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 422
6141 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 481
6140 Recommendation of Semi Permanent Buildings for Tsunami Prone Areas

Authors: Fitri Nugraheni, Adwitya Bhaskara, N. Faried Hanafi

Abstract:

Coastal is one area that can be a place to live. Various buildings can be built in the area around the beach. Many Indonesians use beaches as housing and work, but we know that coastal areas are identical to tsunami and wind. Costs incurred due to permanent damage caused by tsunamis and wind disasters in Indonesia can be minimized by replacing permanent buildings into semi-permanent buildings. Semi-permanent buildings can be realized by using cold-formed steel as a building. Thus, the purpose of this research is to provide efficient semi-permanent building recommendations for residents around the coast. The research is done by first designing the building model by using sketch-up software, then the validation phase is done in consultation with the expert consultant of cold form steel structure. Based on the results of the interview there are several revisions on several sides of the building by adding some bracing rods on the roof, walls and floor frame. The result of this research is recommendation of semi-permanent building model, where the nature of the building; easy to disassemble and install (knockdown), tsunami-friendly (continue the tsunami load), cost and time efficient (using cold-formed-steel and prefabricated GRC), zero waste, does not require many workers (less labor). The recommended building design concept also keeps the architecture side in mind thus it remains a comfortable occupancy for the residents.

Keywords: construction method, cold-formed steel, efficiency, semi-permanent building, tsunami

Procedia PDF Downloads 254
6139 Uncertainty in Building Energy Performance Analysis at Different Stages of the Building’s Lifecycle

Authors: Elham Delzendeh, Song Wu, Mustafa Al-Adhami, Rima Alaaeddine

Abstract:

Over the last 15 years, prediction of energy consumption has become a common practice and necessity at different stages of the building’s lifecycle, particularly, at the design and post-occupancy stages for planning and maintenance purposes. This is due to the ever-growing response of governments to address sustainability and reduction of CO₂ emission in the building sector. However, there is a level of uncertainty in the estimation of energy consumption in buildings. The accuracy of energy consumption predictions is directly related to the precision of the initial inputs used in the energy assessment process. In this study, multiple cases of large non-residential buildings at design, construction, and post-occupancy stages are investigated. The energy consumption process and inputs, and the actual and predicted energy consumption of the cases are analysed. The findings of this study have pointed out and evidenced various parameters that cause uncertainty in the prediction of energy consumption in buildings such as modelling, location data, and occupant behaviour. In addition, unavailability and insufficiency of energy-consumption-related inputs at different stages of the building’s lifecycle are classified and categorized. Understanding the roots of uncertainty in building energy analysis will help energy modellers and energy simulation software developers reach more accurate energy consumption predictions in buildings.

Keywords: building lifecycle, efficiency, energy analysis, energy performance, uncertainty

Procedia PDF Downloads 105
6138 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 267
6137 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 35
6136 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 529
6135 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 418
6134 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 321
6133 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law

Authors: Ying Zhu

Abstract:

Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.

Keywords: foreign investment, artificial intelligence, international investment law, national security exception

Procedia PDF Downloads 122
6132 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4

Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono

Abstract:

Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.

Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations

Procedia PDF Downloads 121
6131 Sky Farming: The Alternative Concept of Green Building Using Vertical Landscape Model in Urban Area as an Effort to Achieve Sustainable Development

Authors: Nadiah Yola Putri, Nesia Putri Sharfina, Traviata Prakarti

Abstract:

This paper is a literature review presented descriptively to review the concept of green building to face the challenge of sustainable development and food in urban areas. In this paper, researchers initiated the concept of green building with sky farming method. Sky farming use vertical landscape system in order to realizing food self-sufficient green city. Sky farming relying on plantings and irrigation system efficiency in the building which is adopted the principles of green building. Planting system is done by applying hydroponic plants with Nutrient Film Technique (NFT) using energy source of solar cell and grey water from the processing of waste treatment plant. The application of sky farming in urban areas can be a recommendation for the design of environmental-friendly construction. In order to keep the land and distance efficiency, this system is a futuristic idea that would be the connector of human civilization in the future.

Keywords: green building, urban area, sky farming, vertical landscape

Procedia PDF Downloads 333
6130 A Study on The Relationship between Building Façade and Solar Energy Utilization Potential in Urban Residential Area in West China

Authors: T. Wen, Y. Liu, J. Wang, W. Zheng, T. Shao

Abstract:

Along with the increasing density of urban population, solar energy potential of building facade in high-density residential areas become a question that needs to be addressed. This paper studies how the solar energy utilization potential of building facades in different locations of a residential areas changes with different building layouts and orientations in Xining, a typical city in west China which possesses large solar radiation resource. Solar energy potential of three typical building layouts of residential areas, which are parallel determinant, gable misalignment, transverse misalignment, are discussed in detail. First of all, through the data collection and statistics of Xining new residential area, the most representative building parameters are extracted, including building layout, building height, building layers, and building shape. Secondly, according to the results of building parameters extraction, a general model is established and analyzed with rhinoceros 6.0 and its own plug-in grasshopper. Finally, results of the various simulations and data analyses are presented in a visualized way. The results show that there are great differences in the solar energy potential of building facades in different locations of residential areas under three typical building layouts. Generally speaking, the solar energy potential of the west peripheral location is the largest, followed by the East peripheral location, and the middle location is the smallest. When the deflection angle is the same, the solar energy potential shows the result that the West deflection is greater than the East deflection. In addition, the optimal building azimuth range under these three typical building layouts is obtained. Within this range, the solar energy potential of the residential area can always maintain a high level. Beyond this range, the solar energy potential drops sharply. Finally, it is found that when the solar energy potential is maximum, the deflection angle is not positive south, but 5 °or 15°south by west. The results of this study can provide decision analysis basis for residential design of Xining city to improve solar energy utilization potential and provide a reference for solar energy utilization design of urban residential buildings in other similar areas.

Keywords: building facade, solar energy potential, solar radiation, urban residential area, visualization, Xining city

Procedia PDF Downloads 148
6129 Analysis on the Building Energy Performance of a Retrofitted Residential Building with RETScreen Expert Software

Authors: Abdulhameed Babatunde Owolabi, Benyoh Emmanuel Kigha Nsafon, Jeung-Soo Huh

Abstract:

Energy efficiency measures for residential buildings in South Korea is a national issue because most of the apartments built in the last decades were constructed without proper energy efficiency measures making the energy performance of old buildings to be very poor when compared with new buildings. However, the adoption of advanced building technologies and regulatory building codes are effective energy efficiency strategies for new construction. There is a need to retrofits the existing building using energy conservation measures (ECMs) equipment’s in order to conserve energy and reduce GHGs emissions. To achieve this, the Institute for Global Climate Change and Energy (IGCCE), Kyungpook National University (KNU), Daegu, South Korea employed RETScreen Expert software to carry out measurement and verification (M&V) analysis on an existing building in Korea by using six years gas consumption data collected from Daesung Energy Co., Ltd in order to determine the building energy performance after the introduction of ECM. Through the M&V, energy efficiency is attained, and the resident doubt was reduced. From the analysis, a total of 657 Giga Joules (GJ) of liquefied natural gas (LNG) was consumed at the rate of 0.34 GJ/day having a peak in the year 2015, which cost the occupant the sum of $10,821.

Keywords: energy efficiency, measurement and verification, performance analysis, RETScreen experts

Procedia PDF Downloads 103
6128 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 228
6127 Low-Level Forced and Ambient Vibration Tests on URM Building Strengthened by Dampers

Authors: Rafik Taleb, Farid Bouriche, Mehdi Boukri, Fouad Kehila

Abstract:

The aim of the paper is to investigate the dynamic behavior of an unreinforced masonry (URM) building strengthened by DC-90 dampers by ambient and low-level forced vibration tests. Ambient and forced vibration techniques are usually applied to reinforced concrete or steel buildings to understand and identify their dynamic behavior, however, less is known about their applicability for masonry buildings. Ambient vibrations were measured before and after strengthening of the URM building by DC-90 dampers system. For forced vibration test, a series of low amplitude steady state harmonic forced vibration tests were conducted after strengthening using eccentric mass shaker. The resonant frequency curves, mode shapes and damping coefficients as well as stress distribution in the steel braces of the DC-90 dampers have been investigated and could be defined. It was shown that the dynamic behavior of the masonry building, even if not regular and with deformable floors, can be effectively represented. It can be concluded that the strengthening of the building does not change the dynamic properties of the building due to the fact of low amplitude excitation which do not activate the dampers.

Keywords: ambient vibrations, masonry buildings, forced vibrations, structural dynamic identification

Procedia PDF Downloads 374
6126 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 248
6125 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 276