Search results for: national security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1668

Search results for: national security

1188 National Specific of Idioms in Kazakh and Korean Languages

Authors: Akerke B. Abagan, Baiyan N. Jubatova

Abstract:

It is well known that the phraseology of a language - the phenomenon of identity. This uniqueness is due to the fact that "there are idioms image-based views of reality that shows mainly of everyday empirical, historical and spiritual experience of a language community, associated with its cultural traditions. The article says that the phraseological units very clearly show the image of the people and give us a great view of the national identity. With the phraseology of the Kazakh and Korean language can understand the mentality of the nation, identity, perception of people. It is in the phraseological units can surprise the culture and customs of the people. Phraseological units store and transmit information about the level of material and spiritual culture of the people, his life, past and present, the development of society in general. And in Korean and Kazakh languages idioms occupy a particularly important role.

Keywords: Comparative method, idioms, lingvoculture, phraseology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2917
1187 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: Smart grid network, security, threats, vulnerabilities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 517
1186 Characteristics of the Long-Term Regional Tourism Development in Georgia

Authors: Valeri Arghutashvili, Mari Gogochuri

Abstract:

Tourism industry development is one of the key priorities in Georgia, as it has positive influence on economic activities. Its contribution is very important for the different regions, as well as for the national economy. Benefits of the tourism industry include new jobs, service development, and increasing tax revenues, etc. The main aim of this research is to review and analyze the potential of the Georgian tourism industry with its long-term strategy and current challenges. To plan activities in a long-term development, it is required to evaluate several factors on the regional and on the national level. Factors include activities, transportation, services, lodging facilities, infrastructure and institutions. The major research contributions are practical estimates about regional tourism development which plays an important role in the integration process with global markets.

Keywords: Regional tourism, tourism industry, tourism in Georgia, tourism benefits.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 807
1185 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analyzed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, Local community, Wild edible plants, Nutrition, Food security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4009
1184 Hardware Prototyping of an Efficient Encryption Engine

Authors: Muhammad I. Ibrahimy, Mamun B.I. Reaz, Khandaker Asaduzzaman, Sazzad Hussain

Abstract:

An approach to develop the FPGA of a flexible key RSA encryption engine that can be used as a standard device in the secured communication system is presented. The VHDL modeling of this RSA encryption engine has the unique characteristics of supporting multiple key sizes, thus can easily be fit into the systems that require different levels of security. A simple nested loop addition and subtraction have been used in order to implement the RSA operation. This has made the processing time faster and used comparatively smaller amount of space in the FPGA. The hardware design is targeted on Altera STRATIX II device and determined that the flexible key RSA encryption engine can be best suited in the device named EP2S30F484C3. The RSA encryption implementation has made use of 13,779 units of logic elements and achieved a clock frequency of 17.77MHz. It has been verified that this RSA encryption engine can perform 32-bit, 256-bit and 1024-bit encryption operation in less than 41.585us, 531.515us and 790.61us respectively.

Keywords: RSA, FPGA, Communication, Security, VHDL.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1403
1183 Review of Trust Models in Wireless Sensor Networks

Authors: V. Uma Rani, K. Soma Sundaram

Abstract:

The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. This paper discussed the kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network. It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.

Keywords: Attacks, Security, Trust, Trust model, Wireless sensor network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4517
1182 Vulnerability of Indian Agriculture to Climate Change: A Study of the Himalayan Region State

Authors: Rajendra Kumar Isaac, Monisha Isaac

Abstract:

Climate variability and changes are the emerging challenges for Indian agriculture with the growing population to ensure national food security. A study was conducted to assess the Climatic Change effects in medium to low altitude areas of the Himalayan region causing changes in land use and cereal crop productivity with the various climatic parameters. The rainfall and temperature changes from 1951 to 2013 were studied at four locations of varying altitudes, namely Hardwar, Rudra Prayag, Uttar Kashi and Tehri Garwal. It was observed that there is noticeable increment in temperature on all the four locations. It was surprisingly observed that the mean rainfall intensity of 30 minutes duration has increased at the rate of 0.1 mm/hours since 2000. The study shows that the combined effect of increasing temperature, rainfall, runoff and urbanization at the mid-Himalayan region is causing an increase in various climatic disasters and changes in agriculture patterns. A noticeable change in cropping patterns, crop productivity and land use change was observed. Appropriate adaptation and mitigation strategies are necessary to ensure that sustainable and climate-resilient agriculture. Appropriate information is necessary for farmers, as well as planners and decision makers for developing, disseminating and adopting climate-smart technologies.

Keywords: Climate variability, agriculture, land use, mitigation strategies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2088
1181 W-CAS: A Central Users Authentication and Authorization System for Enterprise Wide Web Applications

Authors: Sharil Tumin, Sylvia Encheva

Abstract:

Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.

Keywords: Authentication, Authorization, Security, Protected Web-based Applications

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1508
1180 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: Optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, Steganalysis Heuristic approach.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1138
1179 A Robust Image Watermarking Scheme using Image Moment Normalization

Authors: Latha Parameswaran, K. Anbumani

Abstract:

Multimedia security is an incredibly significant area of concern. A number of papers on robust digital watermarking have been presented, but there are no standards that have been defined so far. Thus multimedia security is still a posing problem. The aim of this paper is to design a robust image-watermarking scheme, which can withstand a different set of attacks. The proposed scheme provides a robust solution integrating image moment normalization, content dependent watermark and discrete wavelet transformation. Moment normalization is useful to recover the watermark even in case of geometrical attacks. Content dependent watermarks are a powerful means of authentication as the data is watermarked with its own features. Discrete wavelet transforms have been used as they describe image features in a better manner. The proposed scheme finds its place in validating identification cards and financial instruments.

Keywords: Watermarking, moments, wavelets, content-based, benchmarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1494
1178 The Announcer Trainee Satisfaction by National Broadcasting and Telecommunications Commission of Thailand

Authors: Nareenad Panbun

Abstract:

The objective is to study the knowledge utilization from the participants of the announcer training program by National Broadcasting and Telecommunications Commission (NBTC). This study is a quantitative research based on surveys and self-answering questionnaires. The population of this study is 100 participants randomly chosen by non-probability sampling method. The results have shown that most of the participants were satisfied with the topics of general knowledge about the broadcasting and television business for 37 people representing 37%, followed by the topics of broadcasting techniques. The legal issues, consumer rights, television business ethics, and credibility of the media are, in addition to the media's role and responsibilities in society, the use of language for successful communication. Therefore, the communication language skills are the most important for all of the trainees and will also build up the image of the broadcasting center.

Keywords: Announcer training program, participant, requirements announced, theory of utilization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 707
1177 An Enhanced Associativity Based Routing with Fuzzy Based Trust to Mitigate Network Attacks

Authors: K. Geetha, P. Thangaraj

Abstract:

Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure. MANET is vulnerable to security threats due to network’s limited security, dynamic topology, scalability and the lack of central management. The Quality of Service (QoS) routing in such networks is limited by network breakage caused by node mobility or nodes energy depletions. The impact of node mobility on trust establishment is considered and its use to propagate trust through a network is investigated in this paper. This work proposes an enhanced Associativity Based Routing (ABR) with Fuzzy based Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS and to mitigate network attacks.

Keywords: Mobile Ad hoc Networks (MANET), Associativity Based Routing (ABR), Fuzzy based Computed Trust.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2515
1176 A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information

Authors: Ali Shariq Imran, M. Younus Javed, Naveed Sarfraz Khattak

Abstract:

This paper presents a novel method for data hiding based on neighborhood pixels information to calculate the number of bits that can be used for substitution and modified Least Significant Bits technique for data embedding. The modified solution is independent of the nature of the data to be hidden and gives correct results along with un-noticeable image degradation. The technique, to find the number of bits that can be used for data hiding, uses the green component of the image as it is less sensitive to human eye and thus it is totally impossible for human eye to predict whether the image is encrypted or not. The application further encrypts the data using a custom designed algorithm before embedding bits into image for further security. The overall process consists of three main modules namely embedding, encryption and extraction cm.

Keywords: Data hiding, image processing, information security, stagonography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2299
1175 An Environmental Impact Tool to Assess National Energy Scenarios

Authors: R. Taviv, A.C. Brent, H. Fortuin

Abstract:

The Long-range Energy and Alternatives Planning (LEAP) energy planning system has been developed for South Africa, for the 2005 base year and a limited number of plausible future scenarios that may have significant implications (negative or positive) in terms of environmental impacts. The system quantifies the national energy demand for the domestic, commercial, transport, industry and agriculture sectors, the supply of electricity and liquid fuels, and the resulting emissions. The South African National Energy Research Institute (SANERI) identified the need to develop an environmental assessment tool, based on the LEAP energy planning system, to provide decision-makers and stakeholders with the necessary understanding of the environmental impacts associated with different energy scenarios. A comprehensive analysis of indicators that are used internationally and in South Africa was done and the available data was accessed to select a reasonable number of indicators that could be utilized in energy planning. A consultative process was followed to determine the needs of different stakeholders on the required indicators and also the most suitable form of reporting. This paper demonstrates the application of Energy Environmental Sustainability Indicators (EESIs) as part of the developed tool, which assists with the identification of the environmental consequences of energy generation and use scenarios and thereby promotes sustainability, since environmental considerations can then be integrated into the preparation and adoption of policies, plans, programs and projects. Recommendations are made to refine the tool further for South Africa.

Keywords: Energy modeling, LEAP, environmental impact, environmental indicators, energy sector emissions, sustainable development, South Africa

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1567
1174 Using the Geographic Information System (GIS) in the Sustainable Transportation

Authors: Zahra Gharineiat, Malik Khalfan

Abstract:

The significance of emissions from the road transport sector (such as air pollution, noise, etc) has grown considerably in recent years. In Australia, 14.3% of national greenhouse gas emissions in 2000 were the transport sector-s share which 12.9% of net national emissions were related to a road transport alone. Considering the growing attention to the green house gas(GHG) emissions, this paper attempts to provide air pollution modeling aspects of environmental consequences of the road transport by using one of the best computer based tools including the Geographic Information System (GIS). In other word, in this study, GIS and its applications is explained, models which are used to model air pollution and GHG emissions from vehicles are described and GIS is applied in real case study that attempts to forecast GHG emission from people who travel to work by car in 2031 in Melbourne for analysing results as thematic maps.

Keywords: Geographic Information System (GIS), Green HouseGas(GHG) emission, sustainable development, transportation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2590
1173 Social Dimension of Air Transport Sustainable Development

Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki

Abstract:

Air Transport links markets and individuals, making regions more competitive and promoting social and economic development. The assessment of social contribution is the key objective of this paper, focusing on the definition of the components of social dimension and welfare metrics in the national scale. According to a top-down approach, the key dimensions that affect the social welfare are presented. Conventional wisdom is to provide estimations on added value to social issues caused by the air transport development and present the methodology framework for measuring the contribution of transport development in social value chain. Greece is the case study of this paper, providing results from the contribution of air transport infrastructures in national welfare. The application key findings are essential for managers and decision makers to support actions and plans towards economic recovery of an economy presenting strong seasonal characteristics (because of tourism) and suffering from recession.

Keywords: Air transport, social dimension, social coherence, resilient business development, socioeconomic impact.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 884
1172 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1350
1171 A New Approach to Steganography using Sinc-Convolution Method

Authors: Ahmad R. Naghsh-Nilchi, Latifeh Pourmohammadbagher

Abstract:

Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. The encryption methods are usually much more robust than the steganographic ones. However, they have a high visibility and would provoke the attackers easily since it usually is obvious from an encrypted image that something is hidden! The combination of steganography and encryption will cover both of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm. This method could be applied to almost all image formats including TIF, BMP, GIF and JPEG. The experiment results show that our method is able to hide a desired image with high security and low visibility.

Keywords: Sinc Approximation, Image Encryption, Sincconvolution, Image Steganography, JSTEG.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1774
1170 Governance through Cooperation: Solvit System and its Role in the Correct Implementation of the European Law by the National Public Administrations

Authors: C. Mătusescu, C. Mares, C. Gilia

Abstract:

The Implementation of the Union law faces major challenges today. If for a long period of time, the Community and the Union have persevered in their legislative vocation, now one can notice that this large legislative quantity has complicated the task of knowledge and of application the European standards. Under these circumstances, it became necessary, in order to give effectiveness to the European legislation, the development of some operational application criteria and the generation of some new implementation tools. The correct application of the European Union legislation by the national public administrations was considered by the European Commission as being crucial for further integration and proper functioning of the internal market. Among the initiatives launched in the past years to promote the exchange of good administrative practices in the correct application of European Union legislation, SOLVIT net has proved to be one of the most effective.

Keywords: Cooperation, European law, informal mechanisms, internal market, SOLVIT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1296
1169 New Analysis Methods on Strict Avalanche Criterion of S-Boxes

Authors: Phyu Phyu Mar, Khin Maung Latt

Abstract:

S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers, as well as stream ciphers). S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. They are used for confusion in data security An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes each output bit with probability one half. If a function (cryptographic transformation) is complete, then each output bit depends on all of the input bits. Thus, if it were possible to find the simplest Boolean expression for each output bit in terms of the input bits, each of these expressions would have to contain all of the input bits if the function is complete. From some important properties of S-box, the most interesting property SAC (Strict Avalanche Criterion) is presented and to analyze this property three analysis methods are proposed.

Keywords: S-boxes, cryptosystems, strict avalanche criterion, function, analysis methods.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3867
1168 Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

Authors: Revathi Venkataraman, M. Pushpalatha, T. Rama Rao

Abstract:

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their neighbors. Some others may act malicious by launching active security attacks like denial of service. This paper addresses few related works done on trust evaluation and establishment in ad hoc networks. Related works on flooding attack prevention are reviewed. A new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment. The performance of the trust algorithm is tested in an ad hoc network implementing the Ad hoc On-demand Distance Vector (AODV) protocol.

Keywords: AODV, Flooding, MANETs, trust estimation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2338
1167 Anti-Counterfeiting Solution Employing Mobile RFID Environment

Authors: Juhan Kim, Howon Kim

Abstract:

EPC Class-1 Generation-2 UHF tags, one of Radio frequency identification or RFID tag types, is expected that most companies are planning to use it in the supply chain in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. In this paper, we propose a product authentication solution for anti-counterfeiting at application level in the supply chain and mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to general consumers with mobile RFID devices like mobile phone or PDA which has a mobile RFID reader. We will discuss anti-counterfeiting mechanisms which are required to our proposed solution and address requirements that the mechanisms should have.

Keywords: EPC, RFID, Anti-Counterfeiting, Mobile RFIDenvironment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2081
1166 Is the Expansion of High-Tech Leaders Possible Within the New EU Members? A Case Study of Ammono S.A. and the High-Tech Financing System in Poland

Authors: Monika Dwilinska

Abstract:

Innovations, especially technological, are considered key-drivers for sustainable economic growth and competitiveness in the globalised world. As such they should also play an important role in the process of economical convergence inside the EU. Unfortunately, the problem of insufficient innovation performance concerns around half of the EU countries. Poland shows that a lack of a consistent high-tech financing system constitutes a serious obstacle for the development of innovative firms. In this article we will evaluate these questions referring to the example of Ammono S.A., a Polish company established to develop and commercialise an original technology for the production of bulk GaN crystals. We will focus on its efforts to accumulate the financial resources necessary at different stages of its development. The purpose of this article is to suggest possible ways to improve the national innovative system, which would make it more competent in generating high-tech leaders.

Keywords: High-tech financing, innovation, national innovative system

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1241
1165 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: Attack modeling, crime commission process, crime script, situational crime prevention.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 609
1164 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: Reasoning, Bayesian networks, cyber-attack attribution, kill chain, threat intelligence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2621
1163 Globalisation, ICTs and National Identity: The Consequences of ICT Policy in Malaysia

Authors: Abd Rasid Abd Rahman

Abstract:

For the past thirty years the Malaysian economy has been said to contribute well to the progress of the nations. However, the intensification of global economy activity and the extensive use of Information Communication Technologies (ICTs) in recent years are challenging government-s effort to further develop Malaysian society. The competition posed by the low wage economies such as China and Vietnam have made the government realise the importance of engaging in high-skill and high technology industries. It is hoped this will be the basis of attracting more foreign direct investment (FDI) in order to help the country to compete in globalised world. Using Vision 2020 as it targeted vision, the government has decided to engage in the use of ICTs and introduce many policies pertaining to it. Mainly based on the secondary analysis approach, the findings show that policy pertaining to ICTs in Malaysia contributes to economic growth, but the consequences of this have resulted in greater division within society. Although some of the divisions such as gender and ethnicity are narrowing down, the gap in important areas such as regions and class differences is becoming wider. The widespread use of ICTs might contribute to the further establishment of democracy in Malaysia, but the increasing number of foreign entities such as FDI and foreign workers, cultural hybridisation and to some extent cultural domination are contributing to neocolonialism in Malaysia. This has obvious consequences for the government-s effort to create a Malaysian national identity. An important finding of this work is that there are contradictions within ICT policy between the effort to develop the economy and society.

Keywords: Globalisation, ICTs, ICT Policy, Malaysia, National Identity, Vision 2020

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1796
1162 A Legal Opinion on Mitigation and Adaptation on Air Pollution Strategies for Local Governments in South Africa

Authors: Marjone Van Der Bank, C. M. Van Der Bank

Abstract:

This paper presents an overview of the foundation and evolution of environmental related problems in local governments with specific reference on air pollution in South Africa. Local government has a direct mandate in terms of the Constitution of the Republic of South Africa, 1996 (hereafter, the Constitution). This mandate to protect, fulfil, respect and promote the Bill of Rights by local governments in respect of the powers and functions creates confusion around the role of where a local government fits in, in addressing the problem of climate change in South Africa. A reflection of the evolving legislations, developments, and processes regarding climate change that shaped local government dispensation in South Africa is addressed by the notion of developmental local governments. This paper seeks to examine the advances for mitigation and adaptation regulation of air pollution and application in South Africa. This study involves a qualitative approach that will involve South African national legislation as well as an interpretation of international strategies. A literature review study was conducted to undertake the various aspects of law in order to support the argument undertaken of mitigation and adaptation strategies. The paper presents a detailed discussion of the current legislation and the position as it currently stands, as well as the relevant protections as outlined in the National Environmental Management Act and the National Environmental Management: Air Quality Act. It then proceeds to outline the responsibilities of local governments in South Africa to mitigate and adapt to air pollution strategies.

Keywords: Adaptation, climate change, disaster, local governments, mitigation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 773
1161 Determinants of Aggression among Young Adolescents

Authors: Rita C. Ramos

Abstract:

Aggression is a multi- factorial concept and multilevel in nature. The Young Adolescent is being influenced by family, school and community. This paper is aimed to determine the following: aggression level among young adolescents, difference of level of aggression on school and year levels and to determine the correlates of aggression. There were 142 high school students from two different national highs schools (Region 3 and National Capital Region).Convenience sampling was use in this study. The following measures were used namely: Aggression Scale, Parental Support Fighting Scale, Positive Behavior Scale and Exposure to Violence and Trauma questionnaire. There was no significant difference in aggression level among different year level and schools. The findings of the study suggested that high level of community violence and having low parental support for non-aggressive behavior contribute to the prediction of aggression.

Keywords: Aggression, Determinants, Young Adolescents.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5247
1160 Myth in Political Discourse as a Form of Linguistic Consciousness

Authors: Kuralay Kenzhekanova, Akmaral Dalelbekkyzy

Abstract:

The article is devoted to the problem of political discourse and its reflection on mass cognition. This article is dedicated to describe the myth as one of the main features of political discourse. The dominance of an expressional and emotional component in the myth is shown. Precedent phenomenon plays an important role in distinguishing the myth from the linguistic point of view. Precedent phenomena show the linguistic cognition, which is characterized by their fame and recognition. Four types of myths such as master myths, a foundation myth, sustaining myth, eschatological myths are observed. The myths about the national idea are characterized by national specificity. The main aim of the political discourse with the help of myths is to influence on the mass consciousness in order to motivate the addressee to certain actions so that the target purpose is reached owing to unity of forces.

Keywords: Cognition, myth, linguistic consciousness, types of myths, political discourse, political myth, precedent phenomena.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2642
1159 Impact of Crises on Official Statistics: A Case Study of Environmental Statistics at Statistical Centre for the Cooperation Council for the Arab Countries of the Gulf during the COVID-19 Pandemic

Authors: Ibtihaj Al-Siyabi

Abstract:

The crisis of COVID-19 posed enormous challenges to the statistical providers. While official statistics were disrupted by the pandemic and related containment measures, there was a growing and pressing need for real-time data and statistics to inform decisions. This paper gives an account of the way the pandemic impacted the operations of the National Statistical Offices (NSOs) in general in terms of data collection and methods used, and the main challenges encountered by them based on international surveys. It highlights the performance of the Statistical Centre for the Cooperation Council for the Arab Countries of the Gulf, GCC-STAT, and its responsiveness to the pandemic placing special emphasis on environmental statistics. The paper concludes by confirming the GCC-STAT’s resilience and success in facing the challenges.

Keywords: NSO, COVID-19, pandemic, National Statistical Offices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 134