Search results for: urban security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6106

Search results for: urban security

6046 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 245
6045 Forthcoming Big Data on Smart Buildings and Cities: An Experimental Study on Correlations among Urban Data

Authors: Yu-Mi Song, Sung-Ah Kim, Dongyoun Shin

Abstract:

Cities are complex systems of diverse and inter-tangled activities. These activities and their complex interrelationships create diverse urban phenomena. And such urban phenomena have considerable influences on the lives of citizens. This research aimed to develop a method to reveal the causes and effects among diverse urban elements in order to enable better understanding of urban activities and, therefrom, to make better urban planning strategies. Specifically, this study was conducted to solve a data-recommendation problem found on a Korean public data homepage. First, a correlation analysis was conducted to find the correlations among random urban data. Then, based on the results of that correlation analysis, the weighted data network of each urban data was provided to people. It is expected that the weights of urban data thereby obtained will provide us with insights into cities and show us how diverse urban activities influence each other and induce feedback.

Keywords: big data, machine learning, ontology model, urban data model

Procedia PDF Downloads 384
6044 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 487
6043 Mining Multicity Urban Data for Sustainable Population Relocation

Authors: Xu Du, Aparna S. Varde

Abstract:

In this research, we propose to conduct diagnostic and predictive analysis about the key factors and consequences of urban population relocation. To achieve this goal, urban simulation models extract the urban development trends as land use change patterns from a variety of data sources. The results are treated as part of urban big data with other information such as population change and economic conditions. Multiple data mining methods are deployed on this data to analyze nonlinear relationships between parameters. The result determines the driving force of population relocation with respect to urban sprawl and urban sustainability and their related parameters. Experiments so far reveal that data mining methods discover useful knowledge from the multicity urban data. This work sets the stage for developing a comprehensive urban simulation model for catering to specific questions by targeted users. It contributes towards achieving sustainability as a whole.

Keywords: data mining, environmental modeling, sustainability, urban planning

Procedia PDF Downloads 266
6042 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 392
6041 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 90
6040 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 502
6039 Urban Citizenship in a Sensor Rich Society

Authors: Mike Dee

Abstract:

Urban public spaces are sutured with a range of surveillance and sensor technologies that claim to enable new forms of ‘data based citizen participation’, but also increase the tendency for ‘function-creep’, whereby vast amounts of data are gathered, stored and analysed in a broad application of urban surveillance. This kind of monitoring and capacity for surveillance connects with attempts by civic authorities to regulate, restrict, rebrand and reframe urban public spaces. A direct consequence of the increasingly security driven, policed, privatised and surveilled nature of public space is the exclusion or ‘unfavourable inclusion’ of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’ city initiatives refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, in particular, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of remedial action. This paper suggests that cities, places and spaces and those who seek to use them, can be resilient in working to maintain and extend democratic freedoms and processes enshrined in Marshall’s concept of citizenship, calling sensor and surveillance systems to account. Such accountability could better inform the implementation of public policy around the design, build and governance of public space and also understandings of urban citizenship in the sensor saturated urban environment.

Keywords: citizenship, public space, surveillance, young people

Procedia PDF Downloads 420
6038 Translating Ex-landfill Development Needs and Adequacy of Open Space Provision in Malaysian Urban Development

Authors: S. Mazifah, A. Azahan, A. Kadir

Abstract:

This paper aims to examine the relationship between the needs of ex-landfill redevelopment and the adequacy of open space provision in the context of sustainable urban development planning in Malaysia as seen from the perspective of the National Urban Policy. With a specific focus on the Action Plan DPN6 and DPN9, ex-landfill redevelopment needs and provision of open space are detailed to identify their potential and constraints in the development of sustainable cities. As a result, this paper found a link between the needs of urban ex-landfill redevelopment and approach to provide adequate urban open space. Through the proposal of the development of public park at urban ex-landfill sites, the needs of ex-landfill redevelopment and the adequacy of urban open space provision is being 'united' and translated as an approach to create a sustainable urban development in Malaysia.

Keywords: ex-landfill redevelopment, open spaces, National Urban Policy, sustainable urban development

Procedia PDF Downloads 419
6037 Study on Influencing Factors of Walkability of Rail Transit Station Area

Authors: Yang Wenjuan, Xu Yilun

Abstract:

Based on the comparative analysis of the relevant evaluation methods of walking environment, this paper selects the combined evaluation method of macro urban morphology analysis and micro urban design quality survey, then investigates and analyzes the walking environment of three rail transit station area in Nanjing to explore the influence factor and internal relation of walkability of rail transit station area. Analysis shows that micro urban design factors have greater impact on the walkability of rail transit station area compared with macro urban morphology factors, the convenience is the key factor in the four aspects of convenience, security, identity and comfortability of the urban design factors, the convenience is not only affected by the block network form, but also related to the quality of the street space. The overall evaluation of walkability comes from the overlapping and regrouping of the walking environment at different levels, but some environmental factors play a leading role. The social attributes of pedestrians also partly influence their walking perception and evaluation.

Keywords: rail transit station area, walkability, evaluation, influence factors

Procedia PDF Downloads 252
6036 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 517
6035 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
6034 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 470
6033 Exploring the Impact of Location on Urban and Peri-Urban Farming: A Case Study from Lusaka, Zambia

Authors: Cecilia Elisabeth Fåhraeus

Abstract:

In 2016, this author conducted a study on agricultural livelihoods in urban and peri-urban low-income settings in Lusaka, Zambia. The overarching aim was to determine the impact of physical space on agricultural activities, with a particular emphasis on geographical distinctions between urban and peri-urban environments. Agricultural activities among the areas’ residents were mapped through questionnaires, interviews and observations, and included variables such as type of activity and product; degree of marketization; inputs; location of production, storage and vending; labour distribution; production constraints, and associated mobility patterns, among others. The study confirmed that spatial idiosyncrasies of urban and peri-urban environments both enabled and constrained agricultural activity, but not always as anticipated. There were also cross-cutting issues on which physical space appeared to have a limited impact.

Keywords: agricultural production systems, geography, low-income settlements, Lusaka, peri-urban, urban

Procedia PDF Downloads 298
6032 The Extent to Which Social Factors Affect Urban Functional Mutations and Transformations

Authors: Skirmante Mozuriunaite

Abstract:

Contemporary metropolitan areas and large cities are dynamic, rapidly growing and continuously changing. Thus, urban transformations and mutations are not a new phenomenon, but rather a continuous process. Basic factors of urban transformation are related to development of technologies, globalisation, lifestyle, etc., which, in combination with local factors, have generated an extremely great variety of urban development conditions. This article discusses the main urbanisation processes in Lithuania during last 50 year period and social factors affecting urban functional mutations.

Keywords: dispersion, functional mutations, urbanization, urban mutations, social factors

Procedia PDF Downloads 492
6031 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 720
6030 Physical Planning Antidote to Urban Malice

Authors: Adelayo Akeem Jolaoye

Abstract:

Historically urban centers serve as the fulcrum upon which significant complex social and economic development rest. Despite their fixed geographical locations, though in different degree, cities generate self-sustenance and multiplier effects in all aspects of life. They also house inestimable human capital, which serves as a power house for future generation transformation requirements. Unfortunately, the untamed global urbanization process has resulted in an unimaginable damage to the urban social structure as well as urban environmental value. The preceding has caused cities failure in performing their expected roles worst still becoming a regional burden and national liabilities. This paper briefly discusses the ecological concept of urban settlements and reviews the world historical urban evolution and growth. Also, given the above-mentioned anomalies, the paper also raised conceptual principles of urban planning as well as administrative policies for its strategic management.

Keywords: city, urbanization, urban planning, urban malice

Procedia PDF Downloads 264
6029 Decoding Urban Stress Mapping Criteria in Urban Heritage Cores: Gandhi Park, Kerala Case Study

Authors: Ansal D'cruz, Anurup K., Saritha G. Parambath

Abstract:

Physical and mental strain is a growing concern arising from various stressors in an urban context. However, these stressors are relatively less explored in the domain of urban design, especially in Indian cities where the central business district falls within the heritage core. An attempt is made in the context of the heritage core of Thiruvananthapuram city, Kerala, to understand and identify the connection between the built environment and urban stress. The criteria for establishing the indicators were obtained through a systematic literature review. A thorough study conducted in Gandhi Park, East Fort area using the identified criteria resulted in valuable insights into various urban stressors. Onsite surveys established the correlation between the built environment and user stress levels. The study concludes with guidelines for approaching urban stress in urban parks in an Indian context.

Keywords: urban stress, built environment, mental health, urban stressors, urban design

Procedia PDF Downloads 20
6028 A Review of Urban Placemaking Assessment Frameworks

Authors: Amal Abdou, Yasser ElSayed, Nora Selim

Abstract:

Public urban spaces are an essential component in any urban settlement. They are quite important in enhancing the quality of urban life while offering social, health, environmental and economic benefits to a city and its residents. Place-making assessment of public urban spaces has been one of the major guiding principles for urban planning and policymaking, of which the definition and evaluation have become the crucial research topic. It is increasingly being essential to mitigate the undesirable impacts of urbanization in cities while improving public urban space’s resilience to environmental, social, and economic changes. Globally, several place-making assessment tools (PATs) have been developed to make such informed decision-making. They act as a catalyst to increase market demand for sustainable products and services by providing a mechanism for recognizing excellence. Assessing how placemaking can positively contribute to urban environments is critical to inform both the continued development of the place and the way placemaking is done as a practice. Therefore, this study aims to review different themes for assessing urban placemaking in public urban spaces.

Keywords: urban placemaking, public urban spaces, placemaking assessment, literature review

Procedia PDF Downloads 64
6027 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 439
6026 A Conceptual Approach for Evaluating the Urban Renewal Process

Authors: Muge Unal, Ahmet Cilek

Abstract:

Urban identity, having a dynamic characteristic spatial and semantic aspects, is a phenomenon in an ever-changing. Urban identity formation includes not only a process of physical nature but also development and change processes that take place in the political, economic, social and cultural values, whether national and international level. Although the concept of urban transformation is basically regarded as the spatial transformation; in fact, it reveals a holistic perspective and transformation based on dialectical relationship existing between the spatial and social relationship. For this reason, urban renewal needs to address as not only spatial but also the impact of spatial transformation on social, cultural and economic. Implementation tools used in the perception of urban transformation are varied concepts such as urban renewal, urban resettlement, urban rehabilitation, urban redevelopment, and urban revitalization. The phenomenon of urban transformation begins with the Industrial Revolution. Until the 1980s, it was interpreted as reconsidering physical fossil on urban environment factor like occurring in rapid urbanization, changing in the spatial structure of the city, concentrating of the population in urban areas. However, after the 1980s, it has resided in a conceptual structure which requires to be addressed physical, economic, social, technological and integrity of information. In conclusion, urban transformation, when it enter the literature as a practice of planning, has been up to date in terms of the conceptual structure and content and also hasn’t remained behind converting itself. Urban transformation still maintains its simplest expression, while it transforms so fast converts the contents. In this study, the relationship between urban design and components of urban transformation were discussed with strategies used as a place in the historical process of urban transformation besides a general evaluation of the concept of urban renewal.

Keywords: conceptual approach, urban identity, urban regeneration, urban renewal

Procedia PDF Downloads 394
6025 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 197
6024 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 702
6023 Research on Urban Thermal Environment Climate Map Based on GIS: Taking Shapingba District, Chongqing as an Example

Authors: Zhao Haoyue

Abstract:

Due to the combined effects of climate change, urban expansion, and population growth, various environmental issues, such as urban heat islands and pollution, arise. Therefore, reliable information on urban environmental climate is needed to address and mitigate the negative effects. The emergence of urban climate maps provides a practical basis for urban climate regulation and improvement. This article takes Shapingba District, Chongqing City, as an example to study the construction method of urban thermal environment climate maps based on GIS spatial analysis technology. The thermal load, ventilation potential analysis map, and thermal environment comprehensive analysis map were obtained. Based on the classification criteria obtained from the climate map, corresponding protection and planning mitigation measures have been proposed.

Keywords: urban climate, GIS, heat island analysis, urban thermal environment

Procedia PDF Downloads 68
6022 Urban Agriculture Potential and Challenges in Mid-Sized Cities: A Case Study of Neishabour, Iran

Authors: Mohammadreza Mojtahedi

Abstract:

Urban agriculture, in the face of burgeoning urban populations and unchecked urbanization, presents a promising avenue for sustainable economic, social, and environmental growth. This study, set against the backdrop of Neishabour, Iran, delves into the potential and challenges inherent in this domain. Utilizing a descriptive-analytical approach, field survey data were predominantly collated via questionnaires. The research rigor was upheld with the Delphi method affirming the validity and a Cronbach's alpha score exceeding 0.70, underscoring reliability. The study encompassed Neishabour's 2016 populace, pegged at 264,375, drawing a sample size of 384 via Cochran's formula. The findings spotlight Neishabour's pronounced agricultural prowess, as evidenced by a significance level under 0.05 and an average difference of 0.54. Engaging in urban agricultural ventures can notably elevate job quality, spur savings, bolster profitability, promote organic cultivation, and streamline production expenses. However, challenges, such as heightened land valuations for alternative uses, conflicting land engagements, security dilemmas, technical impediments, waning citizen interest, regulatory conundrums, and perceived upfront investment risks, were identified. A silver lining emerged with urban locales, especially streets and boulevards, securing average ratings of 3.90, marking them as prime contenders for urban agricultural endeavors.

Keywords: urban agriculture, sustainable development, mid-sized cities, neishabour.

Procedia PDF Downloads 32
6021 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 272
6020 Urban Form, Heritage, and Disaster Prevention: What Do They Have in Common?

Authors: Milton Montejano Castillo, Tarsicio Pastrana Salcedo

Abstract:

Based on the hypothesis that disaster risk is constructed socially and historically, this article shows the importance of keeping alive the historical memory of disaster by means of architectural and urban heritage conservation. This is illustrated with three examples of Latin American World Heritage cities where disasters like floods and earthquakes have shaped urban form. Therefore, the study of urban form or ‘Urban Morphology’ is proposed as a tool to understand and analyze urban transformations with the documentation of the occurrence of disasters. Lessons learned from such cities may be useful to reduce disasters risk in contemporary built environments.

Keywords: conservation, disaster risk reduction, urban morphology, World Heritage

Procedia PDF Downloads 507
6019 The Application of Modern Technologies in Urban Development

Authors: Solotan A. Tolulope

Abstract:

Due to the lack of application of laws, implementers' acquaintance with the principles of urban planning, or the absence of laws and the governmental role, cities and their urban growth developed more than the fundamental designs and plans. This has led to a lack of foundations and criteria for achieving a life that provides the needs of sufficient housing in urban planning. In this study, we attempted to use cutting-edge innovations and technology to manage and resolve issues while collaborating with planning cadres that have the potential to significantly and favorably impact urban development. This helps to enhance management's function and the effectiveness of urban planning and management. To fulfill the needs of the community and the neighborhoods of these cities, modern approaches and technologies are used, addressing the criteria of sustainability and development. To put the notion of urban sustainability and development into action, this has been researched using global experiences.

Keywords: application, modern, technologies, urban, development

Procedia PDF Downloads 54
6018 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 453
6017 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 412