Search results for: public key infrastructure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1489

Search results for: public key infrastructure

949 Annual and Seasonal Variations in Air Quality Index of the National Capital Region, India

Authors: Surinder Deswal, Vineet Verma

Abstract:

Air Quality Index (AQI) is used as a tool to indicate the level of severity and disseminate the information on air pollution to enable the public to understand the health and environmental impacts of air pollutant concentration levels. The annual and seasonal variation of criteria air pollutants concentration based on the National Ambient Air Quality Monitoring Programme has been conducted for a period of nine years (2006-2014) using the AQI system. AQI was calculated using IND-AQI methodology and Maximum Operator Concept is applied. An attempt has been made to quantify the variations in AQI on an annual and seasonal basis over a period of nine years. Further, year-wise frequency of occurrence of AQI in each category for all the five stations is analysed, which presents in depth analysis of trends over the period of study. The best air quality was observed in the Noida residential area, followed by Noida industrial area during the study period; whereas, Bulandshahar industrial area and Faridabad residential area were observed to have the worst air quality. A shift in the worst air quality from winter to summer season has also been observed during the study period. Further, the level of Respirable Suspended Particulate Matter was found to be above permissible limit at all the stations. The present study helps in enhancing public awareness and calls for the need of immediate measures to be taken to counter-effect the cause of the increasing level of air pollution.

Keywords: Air quality index, annual trends, criteria pollutants, seasonal variation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2542
948 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network

Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola

Abstract:

Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.

Keywords: Mobile ad-hoc network, selfish nodes, reputation-based techniques, acknowledgment-based techniques.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1375
947 An Efficiency Measurement of E-Government Performance for United Nation Ranking Index

Authors: Yassine Jadi, Lin Jie

Abstract:

In order to serve the society in an electronic manner, many developing countries have launched tremendous e-government projects. The strategies of development and implementation e-government system have reached different levels, and to ensure consistency of development, the governments need to evaluate e-government performance. The United nation has design e-government development ranking index (EGDI) that rely on three indexes, Online service index (OSI), Telecommunication Infrastructure index (TII), and human capital index( HCI) which are not reflecting the interaction between a government and their citizens. Based on data envelopment analyses (DEA) technique, we are using E-participating index (EPI) as an output of government effort to evaluate the performance of e-government system. Therefore, the ranking index can be achieved in efficiency manner.

Keywords: E-government, DEA, efficiency measurement, EGDI.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1214
946 Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks

Authors: N. Bhalaji, A. R. Sivaramkrishnan, Sinchan Banerjee, V. Sundar, A. Shanmugam

Abstract:

Nodes in mobile Ad Hoc Network (MANET) do not rely on a central infrastructure but relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes collaborate in routing and forwarding. For individual nodes it might be advantageous not to collaborate, though. In this conceptual paper we propose a new approach based on relationship among the nodes which makes them to cooperate in an Adhoc environment. The trust unit is used to calculate the trust values of each node in the network. The calculated trust values are being used by the relationship estimator to determine the relationship status of nodes. The proposed enhanced protocol was compared with the standard DSR protocol and the results are analyzed using the network simulator-2.

Keywords: Reliable Routing, DSR, Grudger, Adhoc network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2503
945 Environmental Sanitation Dilemma in the Tamale Metropolis, Ghana

Authors: Paul N. Napari, Patrick B. Cobbinah

Abstract:

The 21st century has been characterized by rapid urbanization with its associated environmental sanitation challenges especially in developing countries. However, studies have focused largely on institutional capacity and the resources needed to manage environmental sanitation challenges, with few insights on the attitudes of city residents. This paper analyzes the environmental sanitation situation in a rapidly urbanizing Tamale metropolis, examines how city residents’ attitudes have contributed to poor environmental sanitation and further reviews approaches that have been employed to manage environmental sanitation. Using secondary and empirical data sources, the paper reveals that only 7.5 tons of 150 tons of total daily solid wastes generated is effectively managed. The findings suggest that the poor sanitation in the city is influenced by two factors; poor attitudes of city residents and weak institutions. While poor attitudes towards environmental sanitation has resulted in indiscriminate disposal of waste, weak institutions have resulted in lack of capacity and pragmatic interventions to manage the environmental sanitation challenges in the city. The paper recommends public education on environmental sanitation, public private partnership, increased stakeholder engagement and preparation and implementation of environmental sanitation plan as mechanisms to ensure effective environmental sanitation management in the Tamale metropolis.

Keywords: Environmental sanitation, developing countries, waste management, developing countries, Tamale, urbanization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3979
944 Student Attitude towards Entrepreneurship: A South African and Dutch Comparison

Authors: Natanya Meyer, Johann Landsberg

Abstract:

Unemployment among the youth is a significant problem in South Africa. Large corporations and the public sector simply cannot create enough jobs. Too many youths in South Africa currently do not consider entrepreneurship as an option in order to become independent. Unlike the youth of the Netherlands, South African youth prefer to find employment in the public or private sector. The Netherlands has a much lower unemployment rate than South Africa and the Dutch are generally very entrepreneurial. From early on, entrepreneurship is considered a desirable career option in the Netherlands. The purpose of this study was to determine whether there is a difference in the perceptions of some Dutch and South African students in terms of unemployment and entrepreneurship. Questionnaires were distributed to students at the North West University's Vaal Triangle campus in Vanderbijlpark in Gauteng, South Africa and the Technical University of Delft in the Netherlands. A descriptive statistical analysis approach was followed and the means for the independent questions were calculated. The results demonstrate that the Dutch students are not as concerned about unemployment after completion of their studies as this is not as significant a problem as it is in South Africa. Both groups had positive responses towards the posed questions, but the South African group felt more strongly about the issues. Both groups of students felt that there was a need for more practical entrepreneurship training. The South African education system should focus on practical entrepreneurship training from a young age.

Keywords: Entrepreneurship development, entrepreneurship development programmes, entrepreneurship intention, Netherlands, South Africa, unemployment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1925
943 Commercializing Technology Solutions- Moving from Products to Solutions

Authors: Anand Dass, Hiroaki Murakami

Abstract:

The paper outlines the drivers behind the movement from products to solutions in the Hi-Tech Business-to-Business markets. The paper lists out the challenges in enabling the transformation from products to solutions and also attempts to explore strategic and operational recommendations based on the authors- factual experiences with Japanese Hi-tech manufacturing organizations. Organizations in the Hi-Tech Business-to-Business markets are increasingly being compelled to move to a solutions model from the conventional products model. Despite the added complexity of solutions, successful technology commercialization can be achieved by making prudent choices in defining a relevant solutions model, by backing the solution model through appropriate organizational design, and by overhauling the new product development process and supporting infrastructure.

Keywords: Technology commercialization, Solutions, Hi-Tech companies, Japan, Management of technology

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1358
942 Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes

Authors: Marjan Kuchaki Rafsanjani, Ali Movaghar, Faroukh Koroupi

Abstract:

As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Therefore intrusion detection is one of the possible ways in recognizing a possible attack before the system could be penetrated. All in all, techniques for intrusion detection in old wireless networks are not suitable for MANET. In this paper, we classify the architecture for Intrusion detection systems that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANET presented and compared. We then indicate important future research directions.

Keywords: Intrusion Detection System(IDS), Misbehavingnodes, Mobile Ad Hoc Network(MANET), Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2025
941 Survey on Energy Efficient Routing Protocols in Mobile Ad Hoc Networks

Authors: Swapnil Singh, Sanjoy Das

Abstract:

Mobile Ad-Hoc Network (MANET) is a network without infrastructure dynamically formed by autonomous system of mobile nodes that are connected via wireless links. Mobile nodes communicate with each other on the fly. In this network each node also acts as a router. The battery power and the bandwidth are very scarce resources in this network. The network lifetime and connectivity of nodes depend on battery power. Therefore, energy is a valuable constraint which should be efficiently used. In this paper we survey various energy efficient routing protocols. The energy efficient routing protocols are classified on the basis of approaches they use to minimize the energy consumption. The purpose of this paper is to facilitate the research work and combine the existing solution and to develop a more energy efficient routing mechanism.

Keywords: Delaunay Triangulation, deployment, energy efficiency, MANET.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3038
940 Cost of Governance in Nigeria: In Whose Interest?

Authors: Francis O. Iyoha, Daniel E. Gberevbie, Charles T. Iruonagbe, Matthew E. Egharevba

Abstract:

Cost of governance in Nigeria has become a challenge to development and concern to practitioners and scholars alike in the field of business and social science research. In the 2010 national budget of NGN4.6 trillion or USD28.75billion for instance, only a pantry sum of NGN1.8trillion or USD11.15billion was earmarked for capital expenditure. Similarly, in 2013, out of a total national budget of NGN4.92trillion or USD30.75billion, only the sum of NGN1.50trllion or USD9.38billion was voted for capital expenditure. Therefore, based on the data sourced from the Nigerian Office of Statistics, Central bank of Nigeria Statistical Bulletin as well as from the United Nations Development Programme, this study examined the causes of high cost of governance in Nigeria. It found out that the high cost of governance in the country is in the interest of the ruling class, arising from their unethical behaviour – corrupt practices and the poor management of public resources. As a result, the study recommends the need to intensify the war against corruption and mismanagement of public resources by government officials as possible solution to overcome the high cost of governance in Nigeria. This could be achieved by strengthening the constitutional powers of the various anti-corruption agencies in the area of arrest, investigation and prosecution of offenders without the interference of the executive arm of government either at the local, state or federal level.

Keywords: Capital expenditure, Cost of governance, recurrent expenditure, unethical behaviour.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3530
939 Design of Smart Urban Lighting by Using Social Sustainability Approach

Authors: Mohsen Noroozi, Maryam Khalili

Abstract:

Creating cities, objects and spaces that are economically, environmentally and socially sustainable and which meet the challenge of social interaction and generation change will be one of the biggest tasks of designers. Social sustainability is about how individuals, communities and societies live with each other and set out to achieve the objectives of development model which they have chosen for themselves. Urban lightning as one of the most important elements of urban furniture that people constantly interact with it in public spaces; can be a significant object for designers. Using intelligence by internet of things for urban lighting makes it more interactive in public environments. It can encourage individuals to carry out appropriate behaviors and provides them the social awareness through new interactions. The greatest strength of this technology is its strong impact on many aspects of everyday life and users' behaviors. The analytical phase of the research is based on a multiple method survey strategy. Smart lighting proposed in this paper is an urban lighting designed on results obtained from a collective point of view about the social sustainability. In this paper, referring to behavioral design methods, the social behaviors of the people has been studied. Data show that people demands for a deeper experience of social participation, safety perception and energy saving with the meaningful use of interactive and colourful lighting effects. By using intelligent technology, some suggestions are provided in the field of future lighting to consider the new forms of social sustainability.

Keywords: Behavior model, internet of things, social sustainability, urban lighting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 928
938 Profile of Viral Hepatitis in Saudi Arabia

Authors: A. A. Alshabanat, R. B. Albacker, A. A. Basalama, A. A. Bin Salamah, A. S. Alfrayh

Abstract:

The study was conducted to investigate the profile of hepatitis in Kingdom of Saudi Arabia, and to determine which age group hepatitis viruses most commonly infect. The epidemiology of viral hepatitis in Saudi Arabia has undergone major changes, concurrent with major socioeconomic developments over the last two to three decades. This disease represents a major public health problem in Saudi Arabia resulting in the need for considerable healthcare resources. A retrospective cross sectional analysis of the reported cases of viral hepatitis was conducted based on the reports of The Ministry of Health in Saudi Arabia about Hepatitis A, B and C infections in all regions from the period of January 2006 to December 2010. The study demonstrated that incidence of viral Hepatitis is decreasing, except for Hepatitis B that showed minimal increase. Of hepatitis A, B, and C, Hepatitis B virus (HBV) was the most predominant type, accounting for (53%) of the cases, followed by Hepatitis C virus (HCV) (30%) and HAV (17%). HAV infection predominates in children (5–14 years) with 60% of viral hepatitis cases, HBV in young adults (15–44 years) with 69% of viral hepatitis cases, and HCV in older adults (>45 years) with 59% of viral hepatitis cases. Despite significant changes in the prevalence of viral hepatitis A, B and C, it remains a major public health problem in Saudi Arabia; however, it showed a significant decline in the last two decades that could be attributed to the vaccination programs and the improved health facilities. Further researches are needed to identify the risk factors making a specific age group or a specific region in Saudi Arabia targeted for a specific type of hepatitis viruses.

Keywords: Epidemiology, Hepatitis, Saudi Arabia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3529
937 Analyzing Convergence of IT and Energy Industry Based on Social System Framework

Authors: Giseob Byun, Ji Yeon Cho, Bong Gyou Lee

Abstract:

The purpose of this study is to analyze Green IT industry in major developed countries and to suggest overall directions for IT-Energy convergence industry. Recently, IT industry is pointed out as a problem such as environmental pollution, energy exhaustion, and high energy consumption. Therefore, Green IT gets focused which concerns as solution of these problems. However, since it is a beginning stage of this convergence area, there are only a few studies of IT-Energy convergence industry. According to this, this study examined the major developed countries in terms of institution arrangements, resources, markets and companies based on Van de Ven(1999)'s social system framework that shows relationship among key components of industrial infrastructure. Subsequently, the direction of the future study of convergence on IT and Energy industry is proposed.

Keywords: Green IT, Energy industry, Convergence, Social System Framework.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1415
936 Investigating Quality Metrics for Multimedia Traffic in OLSR Routing Protocol

Authors: B. Prabhakara Rao, M. V. H. Bhaskara Murthy

Abstract:

An Ad hoc wireless network comprises of mobile terminals linked and communicating with each other sans the aid of traditional infrastructure. Optimized Link State Protocol (OLSR) is a proactive routing protocol, in which routes are discovered/updated continuously so that they are available when needed. Hello messages generated by a node seeks information about its neighbor and if the latter fails to respond to a specified number of hello messages regulated by neighborhood hold time, the node is forced to assume that the neighbor is not in range. This paper proposes to evaluate OLSR routing protocol in a random mobility network having various neighborhood hold time intervals. The throughput and delivery ratio are also evaluated to learn about its efficiency for multimedia loads.

Keywords: Ad hoc Network, Optimized Link State Routing, Multimedia traffic

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1948
935 Overcoming Boundaries in Science – A Plea against Political Isolations

Authors: Tim Engartner

Abstract:

If science is supposed to gain greater social relevance and acceptance, researchers must not only relate to the broader public, but also promote intercourse within the ivory tower itself. The latter process has been under way successfully for a number of years in the form of transdisciplinary research initiatives. What is still lacking is a broad debate about the necessity to look around properly and face up to opposing views on one and the same topic within our own discipline.

Keywords: Schools of thought, pluralism, openness, value judgements, controversy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1129
934 Radio Technology Frequency Identification Applied in High-Voltage Power Transmission- Line for Sag Measurement

Authors: Tlotlollo Sidwell Hlalele, Shengzhi Du

Abstract:

High-voltage power transmission lines are the back bone of electrical power utilities. The stability and continuous monitoring of this critical infrastructure is pivotal. Nine-Sigma representing Eskom Holding SOC limited, South Africa has a major problem on proactive detection of fallen power lines and real time sagging measurement together with slipping of such conductors. The main objective of this research is to innovate RFID technology to solve this challenge. Various options and technologies such as GPS, PLC, image processing, MR sensors and etc., have been reviewed and draw backs were made. The potential of RFID to give precision measurement will be observed and presented. The future research will look at magnetic and electrical interference as well as corona effect on the technology.

Keywords: Precision Measurement, RFID and Sag.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2426
933 Partner Selection in International Strategic Alliances: The Case of the Information Industry

Authors: H. Nakamura

Abstract:

This study analyzes international strategic alliances in the information industry. The purpose of this study is to clarify the strategic intention of an international alliance. Secondly, it investigates the influence of differences in the target markets of partner companies on alliances. Using an international strategy theory approach to analyze the global strategies of global companies, the study compares a database business and an electronic publishing business. In particular, these cases emphasized factors attributable to "people" and "learning", reliability and communication between organizations and the evolution of the IT infrastructure. The theory evolved in this study validates the effectiveness of these strategies.

Keywords: Database business, electronic library, international strategic alliances, partner selection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1157
932 Human Capital and the Innovation System – Case Study of the Mpumalanga Province, South Africa

Authors: Maria E. Eggink

Abstract:

Innovation plays an important role in economic growth and development. Evolutionary economics has entrepreneurs at the centre of the innovation system, but includes all other participants as contributors to the performance of the innovation system. Education and training institutions, one of the participants in the innovation system, contributes in different ways to human capital. The gap in literature on the competence building as part of human capital in the analysis of innovation systems is addressed in this paper. The Mpumalanga Province of South Africa is used as a case study. It was found that the absence of a university, the level of education, the quality and performance in the education sector and the condition of the education infrastructure have not been conducive to learning.

Keywords: Education institutions, human capital, innovation systems, Mpumalanga Province.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2033
931 How Does Improving the Existing DSL Infrastructure Influence the Expansion of Fiber Technology?

Authors: P. Winzer, E. Massarczyk

Abstract:

Experts, enterprises and operators expect that the bandwidth request will increase up to rates of 100 to 1,000 Mbps within several years. Therefore the most important question is which technology shall satisfy the future consumer broadband demands. Currently the consensus is, that the fiber technology has the best technical characteristics to achieve such the high bandwidth rates. But fiber technology is so far very cost-intensive and resource consuming. To avoid these investments, operators are concentrating to upgrade the existing copper and hybrid fiber coax infrastructures. This work presents a comparison of the copper and fiber technologies including an overview about the current German broadband market. Both technologies are reviewed in the terms of demand, willingness to pay and economic efficiency in connection with the technical characteristics.

Keywords: Broadband customer demand, fiber development, G.fast, Vectoring, willingness to payfor broadband services

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1497
930 Memorabilia of Suan Sunandha through Interactive User Interface

Authors: Nalinee Sophatsathit

Abstract:

The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all.

Keywords: Interactive user navigation, high-functionality context, situational context, human-computer interaction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1599
929 An Evaluation of Drivers in Implementing Sustainable Manufacturing in India: Using DEMATEL Approach

Authors: D. Garg, S. Luthra, A. Haleem

Abstract:

Due to growing concern about environmental and social consequences throughout the world, a need has been felt to incorporate sustainability concepts in conventional manufacturing. This paper is an attempt to identify and evaluate drivers in implementing sustainable manufacturing in Indian context. Nine possible drivers for successful implementation of sustainable manufacturing have been identified from extensive review. Further, Decision Making Trial and Evaluation Laboratory (DEMATEL) approach has been utilized to evaluate and categorize these identified drivers for implementing sustainable manufacturing in to the cause and effect groups. Five drivers (Societal Pressure and Public Concerns; Regulations and Government Policies; Top Management Involvement, Commitment and Support; Effective Strategies and Activities towards Socially Responsible Manufacturing and Market Trends) have been categorized into the cause group and four drivers (Holistic View in Manufacturing Systems; Supplier Participation; Building Sustainable culture in Organization; and Corporate Image and Benefits) have been categorized into the effect group. “Societal Pressure and Public Concerns” has been found the most critical driver and “Corporate Image and Benefits” as least critical or the most easily influenced driver to implementing sustainable manufacturing in Indian context. This paper may surely help practitioners in better understanding of these drivers and their priorities towards effective implementation of sustainable manufacturing.

Keywords: Drivers, Decision Making Trial and Evaluation Laboratory (DEMATEL), India, Sustainable Manufacturing (SM).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3221
928 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: Anonymity, authentication, Internet of Things, lightweight, untraceablity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 819
927 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management

Authors: Jiří Barta

Abstract:

The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.

Keywords: Computer Simulation, Symos97, spread, simulation software, harmful substances.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 951
926 Performances and Activities of Urban Communities Leader Based On Sufficiency Economy Philosophy in Dusit District, Bangkok Metropolitan

Authors: Phusit Phukamchanoad

Abstract:

The research studies the behaviors based on sufficiency economy philosophy at individual and community levelsas well as the satisfaction of the urban community leaders by collecting data with purposive sampling technique. For in-depth interviews with 26 urban community leaders, the result shows that the urban community leaders have good knowledge and understanding about sufficiency economy philosophy. Especially in terms of money spending, they must consider the need for living and be economical. The activities in the community or society should not take advantage of the others as well as colleagues. At present, most of the urban community leaders live in sufficient way. They often spend time with public service, but many families are dealing with debt. Many communities have some political conflict and high family allowances because of living in the urban communities with rapid social and economic changes. However, there are many communities that leaders have applied their wisdom in development for their people by gathering and grouping the professionals to form activities such as making chilli sauce, textile organization, making artificial flowers to worship the sanctity. The most prominent group is the foot massage business in Wat Pracha Rabue Tham. This professional group is supported continuously by the government. One of the factors in terms of satisfaction used for evaluating community leaders is the customary administration in brotherly, interdependent way rather than using the absolute power or controlling power, but using the roles of leader to perform the activities with their people intently, determinedly and having public mind for people.

Keywords: Performance and Activities, Sufficiency Economy, Urban Communities Leader.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1879
925 A Secure Mobile OTP Authentication Scheme for User Mobility Cloud VDI Environment

Authors: Jong-won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. To facilitate diverse and wide use of Services in the future, service should be continuous and stable, and above all, security should be considered the most important to meet advanced portability and user accessibility, the strengths of VDI.

Keywords: Cloud, VDI, OTP, Mobility

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2048
924 Estimation of Time Loss and Costs of Traffic Congestion: The Contingent Valuation Method

Authors: Amira Mabrouk, Chokri Abdennadher

Abstract:

The reduction of road congestion which is inherent to the use of vehicles is an obvious priority to public authority. Therefore, assessing the willingness to pay of an individual in order to save trip-time is akin to estimating the change in price which was the result of setting up a new transport policy to increase the networks fluidity and improving the level of social welfare. This study holds an innovative perspective. In fact, it initiates an economic calculation that has the objective of giving an estimation of the monetized time value during the trips made in Sfax. This research is founded on a double-objective approach. The aim of this study is to i) give an estimation of the monetized value of time; an hour dedicated to trips, ii) determine whether or not the consumer considers the environmental variables to be significant, iii) analyze the impact of applying a public management of the congestion via imposing taxation of city tolls on urban dwellers. This article is built upon a rich field survey led in the city of Sfax. With the use of the contingent valuation method, we analyze the “declared time preferences” of 450 drivers during rush hours. Based on the fond consideration of attributed bias of the applied method, we bring to light the delicacy of this approach with regards to the revelation mode and the interrogative techniques by following the NOAA panel recommendations bearing the exception of the valorization point and other similar studies about the estimation of transportation externality.

Keywords: Willingness to pay, value of time, contingent valuation, time value, city toll, transport.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2299
923 Introducing the Main Factors of Accidents on the Roads of Iran and Studying its Causes and Strategies Applied to Decrease it

Authors: Eshagh Rasouli Sarabi, Mir Saeed Moosavi

Abstract:

Road transportation system is the most important method of transporting the goods. Considering the most suitable geographical situation of Iran to transport the goods between Europe and Asia and placement of this country in direction of international corridors (east- west) , (north-south) and Asian land transport to infrastructure development “A.L.T.I.D" and Transport corridor Europe - Caucasus - Asia “T.R.A.C.E.C.A", noticing the security of road transportation system in this country is so important. In this paper the main factors of accidents on the roads of Iran are categorized regarding the rate of accidents occurred. Then apart from studying the main reasons of accidents of every category, the main factors of these events are studied and its strategies in Iran are introduced.

Keywords: Road, Transportation, Accident, Factors

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1745
922 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: Context, exception, default, IDS, Non-monotonic Description Logic JClassicδє, vulnerability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1430
921 Comparison of Prognostic Models in Different Scenarios of Shoreline Position on Ponta Negra Beach in Northeastern Brazil

Authors: Débora V. Busman, Venerando E. Amaro, Mattheus da C. Prudêncio

Abstract:

Prognostic studies of the shoreline are of utmost importance for Ponta Negra Beach, located in Natal, Northeastern Brazil, where the infrastructure recently built along the shoreline is severely affected by flooding and erosion. This study compares shoreline predictions using three linear regression methods (LMS, LRR and WLR) and tries to discern the best method for different shoreline position scenarios. The methods have shown erosion on the beach in each of the scenarios tested, even in less intense dynamic conditions. The WLA_A with confidence interval of 95% was the well-adjusted model and calculated a retreat of -1.25 m/yr to -2.0 m/yr in hot spot areas. The change of the shoreline on Ponta Negra Beach can be measured as a negative exponential curve. Analysis of these methods has shown a correlation with the morphodynamic stage of the beach.

Keywords: Coastal Erosion, Prognostic Model, DSAS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2581
920 Community‐Based Participatory Research in Elderly Health Care of Paisanee Ramintra 65 Community, Bangkok, Thailand

Authors: A. Kulprasutidilok

Abstract:

In order to address the social factors of elderly health care, researcher and community members have turned to more inclusive and participatory approaches to research and interventions. One such approach, community-based participatory research (CBPR) in public health, has received increased attention as the academic and public health communities struggle to address the persistent problems of disparities in the use of health care and health outcomes for several over the past decade. As Thailand becomes an ageing society, health services and proper care systems specifically for the elderly group need to be prepared and well established. The purpose of this assignment was to study the health problems and was to explore the process of community participation in elderly health care. Participants in this study were member of elderly group of Paisanee Ramintra 65 community in Bangkok, Thailand. The results indicated two important components of community participation process in elderly health care: 1) a process to develop community participation in elderly health care, and 2) outcomes resulting from such process. The development of community participation consisted of four processes. As for the outcomes of the community participation development process, they consisted of elderly in the community got jointly and formulated a group, which strengthened the project because of collaborative supervision among themselves. Moreover, inactive health care services have changed to being energetic and focus on health promotion rather than medical achievement and elderly association of community can perform health care activities for chronically illness through the achievement of this development; consequently, they increasingly gained access to physical, cognitive, and social activity.

Keywords: Community-based participatory research, elderly health care, Thailand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1575