Search results for: cryptographic developments
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 988

Search results for: cryptographic developments

928 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 152
927 Understanding Tactical Urbanisms in Derelict Areas

Authors: Berna Yaylalı, Isin Can Traunmüller

Abstract:

This paper explores the emergent bottom-up practices in the fields of architecture and urban design within comparative perspectives of two cities. As a temporary, easily affordable intervention that gives the possibility of transforming neglected spaces into vibrant public spaces, tactical urbanism, together with creative place-making strategies, presents alternative ways of creating sustainable developments in derelict and underused areas. This study examines the potential of social and physical developments through a reading of case studies of two creative spatial practices: a pop-up garden transformed from an unused derelict space in Favoriten, Vienna, and an urban community garden in Kuzguncuk, Istanbul. Two cities are chosen according to their multicultural population and diversity. Istanbul was selected as a design city by UNESCO Creative Cities Network in 2017, and Vienna was declared an open and livable city by its local government. This research will use media archives and reports, interviews with locals and local governments, site observations, and visual recordings as methods to provide a critical reading on creative public spaces from the view of local users in these neighborhoods. Reflecting on these emergent ways, this study aims at discussing the production process of tactile urbanism with the practices of locals and the decision-making process with cases from İstanbul and Vienna. The comparison between their place-making strategies in tactical urbanism will give important insights for future developments.

Keywords: creative city, tactical urbanism, neglected area, public space

Procedia PDF Downloads 70
926 The Application of Robotic Surgical Approaches in the Management of Midgut Neuroendocrine Tumours: A Systematic Review

Authors: Jatin Sridhar Naidu, Aryan Arora, Zainab Shafiq, Reza Mirnezami

Abstract:

Background: Robotic-assisted surgery (RAS) promises good outcomes in midgut adenocarcinoma surgery. However, its effectiveness in midgut neuroendocrine tumours (MNETs) is unknown. This study aimed to assess the current use, user interface, and any emerging developments of RAS in MNET treatment using the literature available. Methods: This review was carried out using PRISMA guidelines. MEDLINE, EMBASE, and Web of Science were searched on 22nd October 2022. All studies reporting primary data on robotic surgery in midgut neuroendocrine tumours or carcinoid tumours were included. The midgut was defined to be from the duodenojejunal flexure to the splenic flexure. Methodological quality was assessed using the Joanna Briggs critical appraisal tool. Results: According to our systematic review protocol, nineteen studies were selected. A total of twenty-six patients were identified. RAS was used for right colectomies, right hemicolectomies, ileal resections, caecal resections, intracorporeal anastomoses, and complete mesocolic excisions. It offered an optimal user-interface with enhanced visuals, fine dexterity, and ergonomic work position. Innovative developments in tumour-healthy tissue boundary and vasculature visualisation were reported. Conclusion: RAS for MNETs is safe and feasible, although the evidence base is limited. We recommend large prospective-randomised controlled trials comparing it with laparoscopy and open surgery. Developments in intraoperative contrast dyes and tumour-specific probes are very promising.

Keywords: robotic surgery, colorectal surgery, neuroendocrine neoplasms, midgut neoplasms

Procedia PDF Downloads 48
925 Transformations of Land Uses and Attitudes in Manavgat Region at South Turkey

Authors: Emrah Yildirim, Veli Ortacesme

Abstract:

Manavgat region, located in Antalya province at South Turkey, has hosted many civilizations throughout the centuries. All of these civilizations cultivated the land in their surroundings by engaging in agriculture, livestock production and hunting. In the last 50 years, there have been dramatic changes in the region. The economy of the region switched from the agriculture to tourism. Due to the increase in the irrigable agricultural lands, several dams were built on Manavgat River. Developments in the agricultural mechanization and new product needs have changed the pattern of agriculture and regional landscape. Coastal zone of the region has transformed to tourism areas, Manavgat Town Center has grown up and the urbanization in general has increased. The population and urbanization have increased by 257 % and 276 %, respectively. The tourism and commercial areas cover 561,8 hectares today. All these developments had some negative effects on the environment. In this study, land use/land cover transformations were studied in Manavgat region by using aerial photos. The reasons and consequences of the land use transformations were discussed, and some recommendations regarding the sustainable use of this region’s landscape will be shared.

Keywords: land use, Manavgat region, south Turkey, transformation

Procedia PDF Downloads 377
924 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey

Authors: Priti Kumari, Tricha Anjali

Abstract:

Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.

Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys

Procedia PDF Downloads 334
923 Focusing of Technology Monitoring Activities Using Indicators

Authors: Günther Schuh, Christina König, Toni Drescher

Abstract:

One of the key factors for the competitiveness and market success of technology-driven companies is the timely provision of information about emerging technologies, changes in existing technologies, as well as relevant related changes in the market's structures and participants. Therefore, many companies conduct technology intelligence (TI) activities to ensure an early identification of appropriate technologies and other (weak) signals. One base activity of TI is technology monitoring, which is defined as the systematic tracking of developments within a specified topic of interest as well as related trends over a long period of time. Due to the very large number of dynamically changing parameters within the technological and the market environment of a company as well as their possible interdependencies, it is necessary to focus technology monitoring on specific indicators or other criteria, which are able to point out technological developments and market changes. In addition to the execution of a literature review on existing approaches, which mainly propose patent-based indicators, it is examined in this paper whether indicator systems from other branches such as risk management or economic research could be transferred to technology monitoring in order to enable an efficient and focused technology monitoring for companies.

Keywords: technology forecasting, technology indicator, technology intelligence, technology management, technology monitoring

Procedia PDF Downloads 444
922 Evolution of Fashion Design in the Era of High-Tech Culture

Authors: Galina Mihaleva, C. Koh

Abstract:

Fashion, like many other design fields, undergoes numerous evolutions throughout the ages. This paper aims to recognize and evaluate the significance of advance technology in fashion design and examine how it changes the role of modern fashion designers by modifying the creation process. It also touches on how modern culture is involved in such developments and how it affects fashion design in terms of conceptualizing and fabrication. The methodology used is through surveying the various examples of technological applications to fashion design and drawing parallels between what was achievable then and what is achievable now. By comparing case studies, existing fashion design examples and crafting method experimentations; we then spot patterns in which to predict the direction of future developments in the field. A breakdown on the elements of technology in fashion design helps us understand the driving force behind such a trend. The results from explorations in the paper have shown that there is an observed pattern of a distinct increase in interest and progress in the field of fashion technology, which leads to the birth of hybrid crafting methods. In conclusion, it is shown that as fashion technology continues to evolve, their role in clothing crafting becomes more prominent and grows far beyond the humble sewing machine.

Keywords: fashion design, functional aesthetics, smart textiles, 3D printing

Procedia PDF Downloads 360
921 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields

Authors: Okoro Ikechukwu Ralph, Fuat Kara

Abstract:

The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.

Keywords: offshore reliability, production performance, subsea control module, well integrity

Procedia PDF Downloads 480
920 Tourism in the Information Age

Authors: Suleyman Karacor

Abstract:

The main purpose of this study is to investigate tourism marketing in the information age because of the importance and sensitivity. In the twenty-first century as a result of today's the increasing competition and product diversification in the tourism sector, tourism businesses must take into account exogenous variables such as new technological developments, commercial experience and consumer demand. In the information age, tourist product consumers tend to reserve their leisure time and expenditure on more active opportunities for different experiences instead of living the same experience again. Increasing the number of agents in the tourism sector, travel opportunities offering different experiences and more intensive use of modern technology helps to present diversification of leisure activities for tourists. From the perspective of tourists, travel costs are still important for buying the touristic products but maintaining a high level of tourist satisfaction is also of increasing importance. Tourists tend to prefer activities that add value. A real tourist product must be able to create value and new priorities for tourists. Therefore this study aims to review recent significant developments in international tourism marketing research and practices. To this end, this study reviews tourism marketing-focused articles.

Keywords: information age, tourism marketing, tourism marketing mix, management

Procedia PDF Downloads 395
919 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 407
918 Technological Developments to Reduce Wind Blade Turbine Levelized Cost of Energy

Authors: Pedro Miguel Cardoso Carneiro, Ricardo André Nunes Borges, João Pedro Soares Loureiro, Hermínio Maio Graça Fernandes

Abstract:

Wind energy has been exponentially growing over the last years and will allow countries to progress regarding the decarbonization objective. In parallel, the maintenance activities have also been increasing in consequence of ageing and deterioration of the wind farms. The time available for wind blade maintenance is given by the weather window that is based upon weather conditions. Most of the wind blade repair and maintenance activities require a narrow window of temperature and humidity. Due to this limitation, the current weather windows result only on approximately 35% days/year are used for maintenance, that takes place mostly during summertime. This limitation creates large economic losses in the energy production of the wind towers, since they can be inoperative or with the energy production output reduced for days or weeks due to existing damages. Another important aspect is that the maintenance costs are higher due to the high standby time and seasonality imposed on the technicians. To reduce the relevant maintenance costs of blades and energy loses some technological developments were carried out to significantly improve this reality. The focus of this activity was to develop a series of key developments to have in the near future a suspended access equipment that can operate in harsh conditions, wind rain, cold/hot environment. To this end we have identified key areas that need to be revised and require new solutions to be found; a habitat system, multi-configurable roof and floor, roof and floor interface to blade, secondary attachment solutions to the blade and to the tower. On this paper we will describe the advances produced during a national R&D project made in partnership with an end-user (Onrope) and a test center (ISQ).

Keywords: wind turbine maintenance, cost reduction, technological innovations, wind turbine blade

Procedia PDF Downloads 57
917 Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing, side channel analysis

Procedia PDF Downloads 394
916 Impact of Management and Development of Destination Attributes on Coastal Tourists' Visitor Experience, Negombo, Sri Lanka

Authors: M. S. R. Waas, S. G. U. S. Chandrarathne, U. A. Kumara

Abstract:

The purpose of this quantitative study is to identify the impact of the destination attributes of Negombo on the coastal tourists’ visitor experience. As an island nation, Sri Lanka is identified and well renowned for its gold sandy beaches and natural scenic beauty. Among many tourist attractions, Negombo is identified as a developed beach centric tourist destination in the country. Yet, it is identified that there are low positive reviews on the internet for Negombo compared to other beach centric tourist attractions in Sri Lanka. Therefore, this study would help the policymakers and tourism service providers to identify the impact of destination attributes on international visitor satisfaction and to understand the visitors comprehensively so as to develop Negombo as a stable tourist destination while offering a memorable and satisfying experience for its visitors. In support, a self-administered questionnaire survey study was performed with 150 respondents (international tourists) in Negombo. The questions were designed based on the selected dimensions of destination attributes such as tourism service quality, infrastructure and superstructure developments, tourist information facilities and destination aesthetics and developments. The results showed that the overall satisfaction level of the international tourists who visit Sri Lanka is significantly affected by the destination attributes of Negombo. Yet, the dimensions of destination aesthetics and developments and tourist information facilities indicated a low level of mean satisfaction, paving the critique that Negombo as a beach centric tourist attraction is not serving well with its natural beauty and its destination management. Further, it is advocated that the policymakers and tourism service providers have a significant role in leading the way to attract more potential visitors to enhance their destination satisfaction and to encourage them to revisit Sri Lanka while recommending it to others. The survey was done during the off-peak season of the industry and it is suggested that the survey would have been conducted throughout a complete year.

Keywords: destination attributes, coastal tourism, tourism development, tourist satisfaction

Procedia PDF Downloads 359
915 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 513
914 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 313
913 Spatial Economic Attributes of O. R. Tambo Airport, South Africa

Authors: Masilonyane Mokhele

Abstract:

Across the world, different planning models of the so-called airport-led developments are becoming bandwagons hailed as key to the future of cities. However, in the existing knowledge, there is paucity of empirically informed description and explanation of the economic fundamentals driving the forces of attraction of airports. This void is arguably a result of the absence of an appropriate theoretical framework to guide the analyses. Given this paucity, the aim of the paper is to contribute towards a theoretical framework that could be used to describe and explain forces that drive the location and mix of airport-centric developments. Towards achieving this aim, the objectives of the paper are: one, to establish the type of economic activities that are located on and around O.R. Tambo International Airport (ORTIA), and analyse the reasons for locating there; two, to establish changes that have occurred over time in the form of the airport-centric development of ORTIA; three, to identify the propulsive economic qualities of ORTIA; four, to analyse the spatial, economic and structural linkages within the airport-centric development of ORTIA, between the airport-centric development and the airport, as well as the airport-centric development’s linkages with their metropolitan area and other regional, national and international airport-centric developments and locations. To address the objectives above, the study adopted a case study approach, centred on ORTIA in South Africa: Africa’s busiest airport in terms of passengers and airfreight handled. Using a lens of location theory, a survey was adopted as a main research method, wherein telephonic interviews were conducted with a representative number of firms on and around ORTIA. Other data collection methods encompassed in-depth qualitative interviews (to augment the information obtained through the survey) and analysis of secondary information, particularly as regards establishing changes that have occurred in the form of ORTIA and surrounds. From the empirical findings, ORTIA was discovered to have propulsive economic qualities that act as significant forces of attraction in the clustering of firms. Together with its airport-centric development, ORTIA was discovered to have growth pole properties because of the linkages that occur within the study area, and the linkages that exist between the airport-centric firms and the airport. It was noted that the transport-oriented firms (typified by couriers and freight carriers) act as anchors in some fellow airport-centric firms making use of elements of urbanisation economies, particularly as regards the use of the airport for airfreight services. The empirical findings presented in the paper (in conjunction with results from other airport-centric development case studies) could be used as contribution towards extending theory that describes and explains forces that drive the location and mix of airport-centric developments.

Keywords: airports, airport-centric development, O. R. Tambo international airport, South Africa

Procedia PDF Downloads 235
912 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 353
911 News Reading Practices: Traditional Media versus New Media

Authors: Nuran Öze

Abstract:

People always want to be aware of what is happening around them. The nature of man constantly triggers the need for gathering information because of curiosity. The media has emerged to save people the need for information. It is known that the media has changed with the technological developments over time, diversified and, people's information needs are provided in different ways. Today, the Internet has become an integral part of everyday life. The invasion of the Internet into everyday life practices at this level affects every aspect of life. These effects cause people to change their life practices. Technological developments have always influenced of people, the way they reach information. Looking at the history of the media, the breaking point about the dissemination of information is seen as the invention of the machine of the printing press. This adventure that started with written media has now become a multi-dimensional structure. Written, audio, visual media has now changed shape with new technologies. Especially emerging of the internet to everyday life, of course, has effects on media field. 'New media' has appeared which contains most of traditional media features in its'. While in the one hand this transformation enables captures a harmony between traditional and new media, on the other hand, new media and traditional media are rivaling each other. The purpose of this study is to examine the problematic relationship between traditional media and new media through the news reading practices of individuals. This study can be evaluated as a kind of media sociology. To reach this aim, two different field researches will be done besides literature review. The research will be conducted in Northern Cyprus. Northern Cyprus Northern Cyprus is located in the Mediterranean Sea. North Cyprus is a country which is not recognized by any country except Turkey. Despite this, takes its share from all technological developments take place in the world. One of the field researches will consist of the questionnaires to be applied on media readers' news reading practices. This survey will be conducted in a social media environment. The second field survey will be conducted in the form of interviews with general editorials or news directors in traditional media. In the second field survey, in-depth interview method will be applied. As a result of these investigations, supporting sides between the new media and the traditional media and directions which contrast with each other will be revealed. In addition to that, it will try to understand the attitudes and perceptions of readers about the traditional media and the new media in this study.

Keywords: new media, news, North Cyprus, traditional media

Procedia PDF Downloads 206
910 Inversion of Electrical Resistivity Data: A Review

Authors: Shrey Sharma, Gunjan Kumar Verma

Abstract:

High density electrical prospecting has been widely used in groundwater investigation, civil engineering and environmental survey. For efficient inversion, the forward modeling routine, sensitivity calculation, and inversion algorithm must be efficient. This paper attempts to provide a brief summary of the past and ongoing developments of the method. It includes reviews of the procedures used for data acquisition, processing and inversion of electrical resistivity data based on compilation of academic literature. In recent times there had been a significant evolution in field survey designs and data inversion techniques for the resistivity method. In general 2-D inversion for resistivity data is carried out using the linearized least-square method with the local optimization technique .Multi-electrode and multi-channel systems have made it possible to conduct large 2-D, 3-D and even 4-D surveys efficiently to resolve complex geological structures that were not possible with traditional 1-D surveys. 3-D surveys play an increasingly important role in very complex areas where 2-D models suffer from artifacts due to off-line structures. Continued developments in computation technology, as well as fast data inversion techniques and software, have made it possible to use optimization techniques to obtain model parameters to a higher accuracy. A brief discussion on the limitations of the electrical resistivity method has also been presented.

Keywords: inversion, limitations, optimization, resistivity

Procedia PDF Downloads 334
909 Evaluating the Challenges of Large Scale Urban Redevelopment Projects for Central Government Employee Housing in Delhi

Authors: Parul Kapoor, Dheeraj Bhardwaj

Abstract:

Delhi and other Indian cities accommodate thousands of Central Government employees in housing complexes called ‘General Pool Residential Accommodation’ (GPRA), located in prime parcels of the city. These residential colonies are now undergoing redevelopment at a massive scale, significantly impacting the ecology of the surrounding areas. Essentially, these colonies were low-rise, low-density planned developments with a dense tree cover and minimal parking requirements. But with increasing urbanisation and spike in parking demand, the proposed built form is an aggregate of high-rise gated complexes, redefining the skyline of the city which is a huge departure from the mediocre setup of Low-rise Walk-up apartments. The complexity of these developments is further aggravated by the need for parking which necessitates cutting huge number of trees to accommodate multiple layers of parking beneath the structures thus sidelining the authentic character of these areas which is laden with a dense tree cover. The aftermath of this whole process is the generation of a huge carbon footprint on the surrounding areas, which is unaccounted for, in the planning and design practice. These developments are currently planned as mix-use compounds with large commercial built-up spaces which have additional parking requirements over and above the residential parking. Also, they are perceived as gated complexes and not as neighborhood units, thus project isolated images of high-rise, dense systems with little context to the surroundings. The paper would analyze case studies of GPRA Redevelopment projects in Delhi, and the lack of relevant development control regulations which have led to abnormalities and complications in the entire redevelopment process. It would also suggest policy guidelines which can establish comprehensive codes for effective planning of these settlements.

Keywords: gated complexes, GPRA Redevelopment projects, increased densities, huge carbon footprint, mixed-use development

Procedia PDF Downloads 89
908 Blockchain-Based Assignment Management System

Authors: Amogh Katti, J. Sai Asritha, D. Nivedh, M. Kalyan Srinivas, B. Somnath Chakravarthi

Abstract:

Today's modern education system uses Learning Management System (LMS) portals for the scoring and grading of student performances, to maintain student records, and teachers are instructed to accept assignments through online submissions of .pdf,.doc,.ppt, etc. There is a risk of data tampering in the traditional portals; we will apply the Blockchain model instead of this traditional model to avoid data tampering and also provide a decentralized mechanism for overall fairness. Blockchain technology is a better and also recommended model because of the following features: consensus mechanism, decentralized system, cryptographic encryption, smart contracts, Ethereum blockchain. The proposed system ensures data integrity and tamper-proof assignment submission and grading, which will be helpful for both students and also educators.

Keywords: education technology, learning management system, decentralized applications, blockchain

Procedia PDF Downloads 47
907 Importance of E-Participation by U-Society in the Development of the U-City

Authors: Jalaluddin Abdul Malek, Mohd Asruladlyi Ibrahim, Zurinah Tahir

Abstract:

This paper is to reveal developments in the areas of urban technology in Malaysia. Developments occur intend to add value intelligent city development to the ubiquitous city (U-city) or smart city. The phenomenon of change is called the development of post intelligent cities. U-City development discourse is seen from the perspective of the philosophy of the virtuous city organized by al-Farabi. The prosperity and perfection of a city is mainly caused by human personality factors, as well as its relationship with material and technological aspects of the city. The question is, to what extent to which human factors are taken into account in the concept of U-City as an added value to the intelligent city concept to realize the prosperity and perfection of the city? Previously, the intelligent city concept was developed based on global change and ICT movement, while the U-city added value to the development of intelligent cities and focused more on the development of information and communications technology (ICT). Value added is defined as the use of fiber optic technology that is wired to the use of wireless technology, such as wireless broadband. In this discourse, the debate on the concept of U-City is to the symbiosis between the U-City and the importance of local human e-participation (U-Society) for prosperity. In the context of virtuous city philosophy, it supports the thought of symbiosis so the concept of U-City can achieve sustainability, prosperity and perfection of the city.

Keywords: smart city, ubiquitous city, u-society, e-participation, prosperity

Procedia PDF Downloads 245
906 Recent Advances of Photo-Detectors in Single Photon Emission Computed Tomography Imaging System

Authors: Qasem A. Alyazji

Abstract:

One of the main techniques for Positron emission tomography (PET), Single photon emission computed tomography (SPECT) is the development of radiation detectors. The NaI(Tl) scintillator crystal coupled to an array of photomultiplier tubes known as the Anger camera, is the most dominant detectors system in PET and SPECT devices. Technological advances in many materials, in addition to the emerging importance of specialized applications such as preclinical imaging and cardiac imaging, have encouraged innovation so that alternatives to the anger camera are now part in alternative imaging systems. In this paper we will discuss the main performance characteristics of detectors devices and scanning developments in both scintillation detectors, semiconductor (solid state) detectors, and Photon Transducers such as photomultiplier tubes (PMTs), position sensitive photomultiplier tubes (PSPMTs), Avalanche photodiodes (APDs) and Silicon photomultiplier (SiPMT). This paper discussed the detectors that showed promising results. This study is a review of recent developments in the detectors used in single photon emission computed tomography (SPECT) imaging system.

Keywords: SPECT, scintillation, PMTs, SiPMT, PSPMTs, APDs, semiconductor (solid state)

Procedia PDF Downloads 124
905 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 373
904 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 316
903 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 132
902 Improving Carbon Fiber Structural Battery Performance with Polymer Interface

Authors: Kathleen Moyer, Nora Ait Boucherbil, Murtaza Zohair, Janna Eaves-Rathert, Cary Pint

Abstract:

This study demonstrates the significance of interface engineering in the field of structural energy by being the first case where the performance of the system with the structural battery is greater than the performance of the same system with a battery separate from the system. The benefits of improving the interface in the structural battery were tested by creating carbon fiber composite batteries (and independent graphite electrodes and lithium iron phosphate electrodes) with and without an improved interface. Mechanical data on the structural batteries were collected using tensile tests and electrochemical data was collected using scanning electron microscopy equipment. The full-cell lithium-ion structural batteries had capacity retention of over 80% exceeding 100 cycles with an average energy density of 52 W h kg−1 and a maximum energy density of 58 W h kg−1. Most scientific developments in the field of structural energy have been done with supercapacitors. Most scientific developments with structural batteries have been done where batteries are simply incorporated into the structural element. That method has limited advantages and can create mechanical disadvantages. This study aims to show that a large improvement in structure energy research can be made by improving the interface between the structural device and the battery.

Keywords: composite materials, electrochemical performance, mechanical properties, polymer interface, structural batteries

Procedia PDF Downloads 75
901 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 399
900 A Traditional Settlement in a Modernized City: Yanbu, Saudi Arabia

Authors: Hisham Mortada

Abstract:

Transition in the urban configuration of Arab cities has never been as radical and visible as it has been since the turn of the last century. The emergence of new cities near historical settlements of Arabia has spawned a series of developments in and around the old city precincts. New developments are based on advanced technology and conform to globally prevalent standards of city planning, superseding the vernacular arrangements based on traditional norms that guided so-called ‘city planning’. Evidence to this fact are the extant Arab buildings present at the urban core of modern cities, which inform us about intricate spatial organization. Organization that subscribed to multiple norms such as, satisfying gender segregation and socialization, economic sustainability, and ensuring security and environmental coherence etc., within settlement compounds. Several participating factors achieved harmony in such an inclusive city—an organization that was challenged and apparently replaced by the new planning order in the face of growing needs of globalized, economy-centric and high-tech models of development. Communities found it difficult to acclimatize with the new western planning models that were implemented at a very large scale throughout the Kingdom, which later experienced spatial re-structuring to suit users’ needs. A closer look the ancient city of Yanbu, now flanked with such new developments, allows us to differentiate and track the beginnings of this unprecedented transition in settlement formations. This paper aims to elaborate the Arabian context offered to both the ‘traditional’ and ‘modern’ planning approaches, in order to understand challenges and solutions offered by both at different times. In the process it will also establish the inconsistencies and conflicts that arose with the shift in planning paradigm, from traditional-'cultural norms’, to modern-'physical planning', in the Arabian context. Thus, by distinguishing the two divergent planning philosophies, their impact of the Arabian morphology, relevance to lifestyle and suitability to the biophysical environment, it concludes with a perspective on sustainability particularly for in case of Yanbu.

Keywords: Yanbu, traditional architecture, Hijaz, coral building, Saudi Arabia

Procedia PDF Downloads 289
899 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 260