Search results for: food security
729 Polyurethane Nanofibers Obtained By Electrospinning Process
Authors: H. Karakaş, A.S. Saraç, T. Polat, E.G. Budak, S. Bayram, N. Dağ, S. Jahangiri
Abstract:
Electrospinning is a broadly used technology to obtain polymeric nanofibers ranging from several micrometers down to several hundred nanometers for a wide range of applications. It offers unique capabilities to produce nanofibers with controllable porous structure. With smaller pores and higher surface area than regular fibers, electrospun fibers have been successfully applied in various fields, such as, nanocatalysis, tissue engineering scaffolds, protective clothing, filtration, biomedical, pharmaceutical, optical electronics, healthcare, biotechnology, defense and security, and environmental engineering. In this study, polyurethane nanofibers were obtained under different electrospinning parameters. Fiber morphology and diameter distribution were investigated in order to understand them as a function of process parameters.Keywords: Electrospinning, polyurethane, nanofibers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4793728 The Incidence of Obesity among Adult Women in Pekanbaru City, Indonesia, Related to High Fat Consumption, Stress Level, and Physical Activity
Authors: Yudia Mailani Putri, Martalena Purba, B. J. Istiti Kandarina
Abstract:
Background: Obesity has been recognized as a global health problem. Individuals classified as overweight and obese are increasing at an alarming rate. This condition is associated with psychological and physiological problems. as a person reaches adulthood, somatic growth ceases. At this stage, the human body has developed fully, to a stable state. As the capital of Riau Province in Indonesia, Pekanbaru is dominated by Malay ethnic population habitually consuming cholesterol-rich fatty foods as a daily menu, a trigger to the onset of obesity resulting in high prevalence of degenerative diseases. Research objectives: The aim of this study is elaborating the relationship between high-fat consumption pattern, stress level, physical activity and the incidence of obesity in adult women in Pekanbaru city. Research Methods: Among the combined research methods applied in this study, the first stage is quantitative observational, analytical cross-sectional research design with adult women aged 20-40 living in Pekanbaru city. The sample consists of 200 women with BMI≥25. Sample data is processed with univariate, bivariate (correlation and simple linear regression) and multivariate (multiple linear regression) analysis. The second phase is qualitative descriptive study purposive sampling by in-depth interviews. six participants withdrew from the study. Results: According to the results of the bivariate analysis, there are relationships between the incidence of obesity and the pattern of high fat foods consumption (energy intake (p≤0.000; r = 0.536), protein intake (p≤0.000; r=0.307), fat intake (p≤0.000; r=0.416), carbohydrate intake (p≤0.000; r=0.430), frequency of fatty food consumption (p≤0.000; r=0.506) and frequency of viscera foods consumption (p≤0.000; r=0.535). There is a relationship between physical activity and incidence of obesity (p≤0.000; r=-0.631). However, there is no relationship between the level of stress (p=0.741; r=0.019-) and the incidence of obesity. Physical activity is a predominant factor in the incidence of obesity in adult women in Pekanbaru city. Conclusion: There are relationships between high-fat food consumption pattern, physical activity and the incidence of obesity in Pekanbaru city whereas physical activity is a predominant factor in the occurrence of obesity, supported by the unchangeable pattern of high-fat foods consumption.
Keywords: Obesity, adult, high in fat, stress, physical activity, consumption pattern.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 818727 Efficacy of Anti-phishing Measures and Strategies - A Research Analysis
Authors: Gundeep Singh Bindra
Abstract:
Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraud so far in America alone, how do we combat phishing?This publication aims to discuss strategies in the war against Phishing. This study is an examination of the analysis and critique found in the ways adopted at various levels to counter the crescendo of phishing attacks and new techniques being adopted for the same. An analysis of the measures taken up by the varied popular Mail servers and popular browsers is done under this study. This work intends to increase the understanding and awareness of the internet user across the globe and even discusses plausible countermeasures at the users as well as the developers end. This conceptual paper will contribute to future research on similar topics.
Keywords: Anti-phishing, countermeasures, effectiveness, fake pages, security analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2766726 Eclectic Rule-Extraction from Support Vector Machines
Authors: Nahla Barakat, Joachim Diederich
Abstract:
Support vector machines (SVMs) have shown superior performance compared to other machine learning techniques, especially in classification problems. Yet one limitation of SVMs is the lack of an explanation capability which is crucial in some applications, e.g. in the medical and security domains. In this paper, a novel approach for eclectic rule-extraction from support vector machines is presented. This approach utilizes the knowledge acquired by the SVM and represented in its support vectors as well as the parameters associated with them. The approach includes three stages; training, propositional rule-extraction and rule quality evaluation. Results from four different experiments have demonstrated the value of the approach for extracting comprehensible rules of high accuracy and fidelity.Keywords: Data mining, hybrid rule-extraction algorithms, medical diagnosis, SVMs
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1707725 Feature Subset Selection Using Ant Colony Optimization
Authors: Ahmed Al-Ani
Abstract:
Feature selection is an important step in many pattern classification problems. It is applied to select a subset of features, from a much larger set, such that the selected subset is sufficient to perform the classification task. Due to its importance, the problem of feature selection has been investigated by many researchers. In this paper, a novel feature subset search procedure that utilizes the Ant Colony Optimization (ACO) is presented. The ACO is a metaheuristic inspired by the behavior of real ants in their search for the shortest paths to food sources. It looks for optimal solutions by considering both local heuristics and previous knowledge. When applied to two different classification problems, the proposed algorithm achieved very promising results.Keywords: Ant Colony Optimization, ant systems, feature selection, pattern recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1601724 Active Packaging Influence on the Shelf Life of Milk Pomade Sweet – Sherbet
Authors: Eva Ungure, Sandra Muizniece-Brasava, Lija Dukalska, Vita Levkane
Abstract:
The objective of the research was to evaluate the quality of milk pomade sweet – sherbet packed in different packaging materials (Multibarrier 60, met.BOPET/PE, Aluthen), by several packaging technologies – active and modified atmosphere (MAP) (consisting of 100% CO2), and control – in air ambiance. Experiments were carried out at the Faculty of Food Technology of Latvia University of Agriculture. Samples were stored at the room temperature +21±1 °C. The physiochemical properties – weight losses, moisture, hardening, colour and changes in headspace atmosphere concentration (CO2 and O2) of packs were analysed before packaging and after 2, 4, 6, 8, 10 and 12 storage weeks.Keywords: packaging, shelf life, sherbet with crunchy peanut chip's
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2196723 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map
Authors: Hongmin Deng, Qionghua Wang
Abstract:
A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).
Keywords: Chaos encryption, logistic map, pseudo-random sequence, RFID.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1411722 Attacks and Counter Measures in BST Overlay Structure of Peer-To-Peer System
Authors: Guruprasad Khataniar, Hitesh Tahbildar, Prakriti Prava Das
Abstract:
There are various overlay structures that provide efficient and scalable solutions for point and range query in a peer-topeer network. Overlay structure based on m-Binary Search Tree (BST) is one such popular technique. It deals with the division of the tree into different key intervals and then assigning the key intervals to a BST. The popularity of the BST makes this overlay structure vulnerable to different kinds of attacks. Here we present four such possible attacks namely index poisoning attack, eclipse attack, pollution attack and syn flooding attack. The functionality of BST is affected by these attacks. We also provide different security techniques that can be applied against these attacks.Keywords: BST, eclipse attack, index poisoning attack, pollution attack, syn flooding attack.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1620721 Microalgae-based Oil for Biodiesel Production
Authors: Marc Veillette, Mostafa Chamoumi, Nathalie Faucheux, Michèle Heitz
Abstract:
Biodiesel is traditionally produced from oleaginous plants. On the other hand, increasing biodiesel production from these raw materials could create problems of food supply. Producing biodiesel from microalgae could help to overcome this difficulty, because microalgae are rich in lipids and do not compete for arable lands. However, no studies had compared vegetable and microalgae oil-based biodiesel in terms of yield, viscosity and heat of combustion. In the present study, commercial canola and microalgae oil were therefore transesterified with methanol under a homogenous alkali catalyst (potassium hydroxide) at 100oC for 1h. The result showed that microalgae-based oil has a higher yield in biodiesel with 89.7% (g biodiesel/g oil) and a lower kinematic viscosity (22oC) of 4.31 mm/s2 than canola oil.Keywords: Biodiesel, microalgae, canola, alkalitransesterification
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1992720 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al Amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: Computer viruses, virus detection, signature-based, behaviour-based, heuristic-based.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4596719 RP-ADAS: Relative Position-Advanced Drive Assistant System based on VANET (GNSS)
Authors: Hun-Jung Lim, Tai-Myoung Chung
Abstract:
Few decades ago, electronic and sensor technologies are merged into vehicles as the Advanced Driver Assistance System(ADAS). However, sensor-based ADASs have limitations about weather interference and a line-of-sight nature problem. In our project, we investigate a Relative Position based ADAS(RP-ADAS). We divide the RP-ADAS into four main research areas: GNSS, VANET, Security/Privacy, and Application. In this paper, we research the GNSS technologies and determine the most appropriate one. With the performance evaluation, we figure out that the C/A code based GPS technologies are inappropriate for 'which lane-level' application. However, they can be used as a 'which road-level' application.Keywords: Relative Positioning, VANET, GNSS, ADAS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2390718 Artificial Neural Network based Web Application Firewall for SQL Injection
Authors: Asaad Moosa
Abstract:
In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.
Keywords: Artificial Neural Networks ANN, SQL Injection, Web Application Firewall WAF, Web Application Scanner WAS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5662717 TACS : Thermo Acoustic Cooling System
Authors: Z. Zarid, C. Gamba, A. Brusseaux, C. Laborie, K. Briens
Abstract:
Cooling with sound is a physical phenomenon allowed by Thermo-Acoustics in which acoustic energy is transformed into a negative heat transfer, in other words: into cooling! Without needing any harmful gas, the transformation is environmentally friendly and can respond to many needs in terms of air conditioning, food refrigeration for domestic use, and cooling medical samples for example. To explore the possibilities of this cooling solution on a small scale, the TACS prototype has been designed, consisting of a low cost thermoacoustic refrigerant “pipe” able to lower the temperature by a few degrees. The obtained results are providing an interesting element for possible future of thermo-acoustic refrigeration.Keywords: Domestic Scale Cooling System, Thermoacoustic, Environmental Friendly Refrigeration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2436716 The Effect of Buckwheat (Fagopyrum esculentum Moench) Groats Addition to the Lard Diet on Antioxidant Parameters of Plasma and Selected Tissues in Wistar Rats
Authors: Chlopicka Joanna, Barton Henryk, Kryczyk Jadwiga, Francik Renata
Abstract:
Recent studies demonstrated that high-fat diet increases oxidative stress in plasma and in a variety of tissues. Many researchers have been looking for natural products, which can reverse the effect of high fat diet. Recently, buckwheat is becoming common ingredient in functional food because of it properties. In study on buckwheat, it is known that, this plant plays roles as anti-oxidative, anti-inflammatory and anti-hypertensive. Nevertheless still little is known about buckwheat groats. The aim of this study was to investigate the effects of addition of buckwheat groats to the fat diet (30% lard), on some antioxidant and oxidant stress parameters in plasma and selected tissues in Wistar rats. The experiment was carried out with three months old male Wistar rats ca. 250g of body weight fed for 5 weeks with either a high-fat (30% of lard) diet or control diet, with or without addition of buckwheat groats. In plasma biochemistry and the activities of the antioxidant enzymes were measured selected tissues: glutathione peroxidase (GPX), catalase (CAT) and the levels of total and reduced glutathione (GSH), free thiol groups (pSH), antioxidant potential of plasma (FRAP) and oxidant stress indices - proteins carbonyl groups (CO) and malonyldialdehyde concentration (MDA). Activity of catalase (CAT) in plasma of rats was significantly increased in buckwheat groats groups and activity of GPx3 in plasma of rats was decreased in buckwheat groups as compared to control group. The reduced glutathione (GSH) in plasma of rats was significantly increased and protein CO was significantly decreased in buckwheat groups as compared to controls. The lowered concentration of GSH was found in serum of rats fed buckwheat groats addition but it accompanied in 7-fold increase in reduced-to-oxidized glutatione ratio, significant increase in HDL and decrease in nonHDL concentration. Conclusions: Buckwheat groats indicate a beneficial effect in inhibiting protein and lipid peroxidation in rats and improved lipid profile. These results suggest that buckwheat groats exert a significant antioxidant potential and may be used as normal food constituent to ameliorate the oxidant-induced damage in organism.
Keywords: Antioxidant, buckwheat, high-fat diet, rats.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2470715 Outsourcing Opportunities for Internet Banking Solutions
Authors: Ondruska Marek, Matustik Ondrej
Abstract:
The main goal of the article is to present new model of application architecture of banking IT solution providing the Internet Banking services that is particularly outsourced. At first, we propose business rationale and a SWOT analysis to explain the reasons for the model in the article. The most important factor for our model is nowadays- big boom around smart phones and tablet devices. As next, we focus on IT architecture viewpoint where we design application, integration and security model. Finally, we propose a generic governance model that serves as a basis for the specialized governance model. The specialized instance of governance model is designed to ensure that the development and the maintenance of different parts of the IT solution are well governed in time.Keywords: governance model, front-end application, Internet Banking, smart phones
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1746714 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.
Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1259713 Screening of Antagonistic/Synergistic Effect between Lactic Acid Bacteria (LAB) and Yeast Strains Isolated from Kefir
Authors: Mihriban Korukluoglu, Goksen Arik, Cagla Erdogan, Selen Kocakoglu
Abstract:
Kefir is a traditional fermented refreshing beverage which is known for its valuable and beneficial properties for human health. Mainly yeast species, lactic acid bacteria (LAB) strains and fewer acetic acid bacteria strains live together in a natural matrix named “kefir grain”, which is formed from various proteins and polysaccharides. Different microbial species live together in slimy kefir grain and it has been thought that synergetic effect could take place between microorganisms, which belong to different genera and species. In this research, yeast and LAB were isolated from kefir samples obtained from Uludag University Food Engineering Department. The cell morphology of isolates was screened by microscopic examination. Gram reactions of bacteria isolates were determined by Gram staining method, and as well catalase activity was examined. After observing the microscopic/morphological and physical, enzymatic properties of all isolates, they were divided into the groups as LAB and/or yeast according to their physicochemical responses to the applied examinations. As part of this research, the antagonistic/synergistic efficacy of the identified five LAB and five yeast strains to each other were determined individually by disk diffusion method. The antagonistic or synergistic effect is one of the most important properties in a co-culture system that different microorganisms are living together. The synergistic effect should be promoted, whereas the antagonistic effect is prevented to provide effective culture for fermentation of kefir. The aim of this study was to determine microbial interactions between identified yeast and LAB strains, and whether their effect is antagonistic or synergistic. Thus, if there is a strain which inhibits or retards the growth of other strains found in Kefir microflora, this circumstance shows the presence of antagonistic effect in the medium. Such negative influence should be prevented, whereas the microorganisms which have synergistic effect on each other should be promoted by combining them in kefir grain. Standardisation is the most desired property for industrial production. Each microorganism found in the microbial flora of a kefir grain should be identified individually. The members of the microbial community found in the glue-like kefir grain may be redesigned as a starter culture regarding efficacy of each microorganism to another in kefir processing. The main aim of this research was to shed light on more effective production of kefir grain and to contribute a standardisation of kefir processing in the food industry.
Keywords: Antagonistic effect, kefir, lactic acid bacteria (LAB), synergistic, yeast.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1521712 Mathematical Modeling of the Working Principle of Gravity Gradient Instrument
Authors: Danni Cong, Meiping Wu, Hua Mu, Xiaofeng He, Junxiang Lian, Juliang Cao, Shaokun Cai, Hao Qin
Abstract:
Gravity field is of great significance in geoscience, national economy and national security, and gravitational gradient measurement has been extensively studied due to its higher accuracy than gravity measurement. Gravity gradient sensor, being one of core devices of the gravity gradient instrument, plays a key role in measuring accuracy. Therefore, this paper starts from analyzing the working principle of the gravity gradient sensor by Newton’s law, and then considers the relative motion between inertial and non-inertial systems to build a relatively adequate mathematical model, laying a foundation for the measurement error calibration, measurement accuracy improvement.Keywords: Gravity gradient, accelerometer, gravity gradient sensor, single-axis rotation modulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1062711 An E-Retailing System Architecture Based on Cloud Computing
Authors: Chanchai Supaartagorn
Abstract:
E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. World eretailing is growing at an exponential rate in the Americas, Europe and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.Keywords: Architecture, cloud computing, e-retailing, internet-based.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3168710 Enhance Performance of Secure Image Using Wavelet Compression
Authors: Goh Han Keat, Azman Samsudin Zurinahni Zainol
Abstract:
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Keywords: Embedded Zerotree Wavelet (EZW), Imagecompression, Wavelet encoder, Entropy encoder, Encryption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1670709 RFID Logistic Management with Cold Chain Monitoring – Cold Store Case Study
Authors: Mira Trebar
Abstract:
Logistics processes of perishable food in the supply chain include the distribution activities and the real time temperature monitoring to fulfil the cold chain requirements. The paper presents the use of RFID (Radio Frequency Identification) technology as an identification tool of receiving and shipping activities in the cold store. At the same time, the use of RFID data loggers with temperature sensors is presented to observe and store the temperatures for the purpose of analyzing the processes and having the history data available for traceability purposes and efficient recall management.
Keywords: Logistics, warehouse, RFID device, cold chain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3712708 Energy Requirement for Cutting Corn Stalks (Single Cross 704 Var.)
Authors: M. Azadbakht, A. Rezaei Asl, K. Tamaskani Zahedi
Abstract:
Corn is cultivated in most countries because of high consumption, quality, and food value. This study evaluated needed energy for cutting corn stems in different levels of cutting height and moisture content. For this reason, test device was fabricated and then calibrated. The device works on the principle of conservation of energy. The results were analyzed using split plot design and SAS software. The results showed that effect of height and moisture content and their interaction effect on cutting energy are significant (P<1%). The maximum cutting energy was 3.22 kJ in 63 (w.b.%) moisture content and the minimum cutting energy was 1.63 kJ in 83.25 (w.b.%) moisture content.
Keywords: Cutting energy, Corn stalk, Cutting height, Moisture content, Impact cutting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3141707 Open Source Library Management System Software: A Review
Authors: Sangsuree Vasupongayya, Kittisak Keawneam, Kittipong Sengloilaun, Patt Emmawat
Abstract:
Library management systems are commonly used in all educational related institutes. Many commercial products are available. However, many institutions may not be able to afford the cost of using commercial products. Therefore, an alternative solution in such situations would be open source software. This paper is focusing on reviewing open source library management system packages currently available. The review will focus on the abilities to perform four basic components which are traditional services, interlibrary load management, managing electronic materials and basic common management system such as security, alert system and statistical reports. In addition, environment, basic requirement and supporting aspects of each open source package are also mentioned.Keywords: open source, library management, review.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7351706 Status and Requirements of Counter-Cyberterrorism
Authors: Jeong-Tae Kim, Tchanghee Hyun
Abstract:
The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect computers on network remain largely unknown. The growing trend toward the use of more automated and menacing attack tools has also overwhelmed some of the current methodologies used for tracking cyber attacks. There is an ample possibility that this kind of cyber attacks can be transform to cyberterrorism caused by illegal purposes. Cyberterrorism is a matter of vital importance to national welfare. Therefore, each countries and organizations have to take a proper measure to meet the situation and consider effective legislation about cyberterrorism.Keywords: Cyberterrorism, cyber attack, information security, legislation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2793705 The Portuguese Press Portrait of “Environmental Refugees“
Authors: Inês Vieira
Abstract:
The migration-environment nexus has gained increased interest from the social research field over the last years. While straightly connected to human security issues, this theme has pervaded through the media to the public sphere. Therefore, it is important to observe how did the discussions over environmentally induced migrations develop from the scientific basis to the media attention, passing through some political voices, and in which ways might these messages be interpreted within the broader public discourses. To achieve this purpose, the analysis of the press entries between 2004 and 2010 in three of the main Portuguese newspapers shall be presented, specially reflecting upon the events, protagonists, topics, geographical attributions and terms/expressions used to define those who migrate due to environmental degradation or disasters.
Keywords: Climate refugees, environmental refugees, environmentally induced migrations, Portuguese written press
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1566704 An Edit-Distance Algorithm to Detect Correlated Attacks in Distributed Systems
Authors: Sule Simsek
Abstract:
Intrusion detection systems (IDS)are crucial components of the security mechanisms of today-s computer systems. Existing research on intrusion detection has focused on sequential intrusions. However, intrusions can also be formed by concurrent interactions of multiple processes. Some of the intrusions caused by these interactions cannot be detected using sequential intrusion detection methods. Therefore, there is a need for a mechanism that views the distributed system as a whole. L-BIDS (Lattice-Based Intrusion Detection System) is proposed to address this problem. In the L-BIDS framework, a library of intrusions and distributed traces are represented as lattices. Then these lattices are compared in order to detect intrusions in the distributed traces.Keywords: Attack graph, distributed, edit-distance, misuse detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1387703 Distributed Denial of Service Attacks in Mobile Adhoc Networks
Authors: Gurjinder Kaur, Yogesh Chaba, V. K. Jain
Abstract:
The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious users to flood the victim network with the large amount of data such that the resources of the victim network are exhausted resulting in the deterioration of the network performance. This paper highlights the effects of different types of DDoS attacks in MANETs and categorizes them according to their behavior.Keywords: Distributed Denial, Mobile Adhoc Networks
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2434702 Consideration Factors of Moving to a New Destination for Coastland Residents Under Global Warming
Authors: Ya-Fen Lee, Yun-Yao Chi, Cing-Hong Hung
Abstract:
Because of the global warming and the rising sea level, residents living in southwestern coastland, Taiwan are faced with the submerged land and may move to higher elevation area. It is desirable to discuss the key consideration factor for selecting the migration location under five dimensions of ಯ security”, “health”, “convenience”, “comfort” and “socio-economic” based on the document reviews. This paper uses the Structural Equation Modeling (SEM) and the questionnaire survey. The analysis results show that the convenience is the most key factor for residents in Taiwan.
Keywords: Global warming, migration, structural equation modelling, questionnaire survey.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1366701 A Combined Cipher Text Policy Attribute-Based Encryption and Timed-Release Encryption Method for Securing Medical Data in Cloud
Authors: G. Shruthi, Purohit Shrinivasacharya
Abstract:
The biggest problem in cloud is securing an outsourcing data. A cloud environment cannot be considered to be trusted. It becomes more challenging when outsourced data sources are managed by multiple outsourcers with different access rights. Several methods have been proposed to protect data confidentiality against the cloud service provider to support fine-grained data access control. We propose a method with combined Cipher Text Policy Attribute-based Encryption (CP-ABE) and Timed-release encryption (TRE) secure method to control medical data storage in public cloud.Keywords: Attribute, encryption, security, trapdoor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 758700 Dynamical Analysis of a Harvesting Model of Phytoplankton-Zooplankton Interaction
Authors: Anuj K. Sharma, Amit Sharma, Kulbhushan Agnihotri
Abstract:
In this work, we propose and analyze a model of Phytoplankton-Zooplankton interaction with harvesting considering that some species are exploited commercially for food. Criteria for local stability, instability and global stability are derived and some threshold harvesting levels are explored to maintain the population at an appropriate equilibrium level even if the species are exploited continuously.Further,biological and bionomic equilibria of the system are obtained and an optimal harvesting policy is also analysed using the Pantryagin’s Maximum Principle.Finally analytical findings are also supported by some numerical simulations.
Keywords: Phytoplankton-Zooplankton, Global stability, Bionomic Equilibrium, Pontrying-Maximum Principal.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2272