Abstract: Ambient Computing or Ambient Intelligence (AmI) is
emerging area in computer science aiming to create intelligently
connected environments and Internet of Things. In this paper, we
propose communication middleware architecture for AmI. This
middleware architecture addresses problems of communication,
networking, and abstraction of applications, although there are other
aspects (e.g. HCI and Security) within general AmI framework.
Within this middleware architecture, any application developer might
address HCI and Security issues with extensibility features of this
platform.
Abstract: A combined heat and power (CHP) system is an efficient and clean way to generate power (electricity). Heat produced by the CHP system can be used for water and space heating. The CHP system which uses hydrogen as fuel produces zero carbon emission. Its’ efficiency can reach more than 80% whereas that of a traditional power station can only reach up to 50% because much of the thermal energy is wasted. The other advantages of CHP systems include that they can decentralize energy generation, improve energy security and sustainability, and significantly reduce the energy cost to the users. This paper presents the economic benefits of using a CHP system in the domestic environment. For this analysis, natural gas is considered as potential fuel as the hydrogen fuel cell based CHP systems are rarely used. UK government incentives for CHP systems are also considered as the added benefit. Results show that CHP requires a significant initial investment in returns it can reduce the annual energy bill significantly. Results show that an investment may be paid back in 7 years. After the back period, CHP can run for about 3 years as most of the CHP manufacturers provide 10 year warranty.
Abstract: Value addition to agricultural produce is of possible
potential in reducing poverty, improving food security and
malnutrition, therefore the need to develop small and microenterprises
of sweet potato production. A study was carried out in Nigeria to determine the acceptability
of blends sweet potato (Ipomea batatas) and commodities yellow
maize (Zea mays), millet (Pennisetum glaucum), soybean (Glycine
max), bambara groundnut (Vigna subterranean), guinea corn
(Sorghum vulgare), wheat (Triticum aestivum), and roselle (Hibiscus
sabdariffa) through sensory evaluation. Sweet potato (Ipomea batatas) roots were processed using two
methods: oven and sun drying. The blends were also assessed in
terms of functional, chemical and color properties. Most acceptable blends include BAW (80:20 of sweet
potato/wheat), BBC (80:20 of sweet potato/guinea corn), AAB (60:40
of sweet potato/guinea corn), YTE (100% soybean), TYG (100%
sweet potato), KTN (100% wheat flour), XGP (80:20 of sweet
potato/soybean), XAX (60:40 of sweet potato/wheat), LSS (100%
Roselle), CHK (100% Guinea corn), and ABC (60:40% of sweet
potato/ yellow maize). In addition, carried out chemical analysis
revealed that sweet potato has high percentage of vitamins A and C,
potassium (K), manganese (Mn), calcium (Ca), magnesium (Mg) and
iron (Fe) and fibre content. There is also an increase of vitamin A and
Iron in the blended products.
Abstract: Ensuring of continuity of business is basic strategy of
every company. Continuity of organization activities includes
comprehensive procedures that help in solving unexpected situations
of natural and anthropogenic character (for example flood, blaze,
economic situations). Planning of continuity operations is a process
that helps identify critical processes and implement plans for the
security and recovery of key processes. The aim of this article is to
demonstrate application of system approach to managing business
continuity called business continuity management systems in military
issues. This article describes the life cycle of business continuity
management which is based on the established cycle PDCA (Plan-
Do-Check-Act). After this is carried out by activities which are
making by University of Defence during activation of forces and
means of the integrated rescue system in case of emergencies -
accidents at a nuclear power plant in Czech Republic. Activities of
various stages of deployment earmarked forces and resources are
managed and evaluated by using MCMS application (Military
Continuity Management System).
Abstract: Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Abstract: Password authentication is one of the widely used
methods to achieve authentication for legal users of computers and
defense against attackers. There are many different ways to
authenticate users of a system and there are many password cracking
methods also developed. This paper proposes how best password
cracking can be performed on a CPU-GPGPU based system. The
main objective of this work is to project how quickly a password can
be cracked with some knowledge about the computer security and
password cracking if sufficient security is not incorporated to the
system.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: With the increasing dependence of countries on the
critical infrastructure, it increases their vulnerability. Big threat is
primarily in the human factor (personnel of the critical infrastructure)
and in terrorist attacks. It emphasizes the development of
methodology for searching of weak points and their subsequent
elimination. This article discusses methods for the analysis of safety
in the objects of critical infrastructure. It also contains proposal for
methodology for training employees of security services in the
objects of the critical infrastructure and developing scenarios of
attacks on selected objects of the critical infrastructure.
Abstract: This paper describes the design and implementation of
a hardware setup for online monitoring of 24 refrigerators inside
blood bank center using the microcontroller and CAN bus for
communications between each node. Due to the security of locations
in the blood bank hall and difficulty of monitoring of each
refrigerator separately, this work proposes a solution to monitor all
the blood bank refrigerators in one location. CAN-bus system is used
because it has many applications and advantages, especially for this
system due to easy in use, low cost, providing a reduction in wiring,
fast to repair and easily expanding the project without a problem.
Abstract: Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.
Abstract: The paper is focused on the application of the security
audit method on the selected objects of the critical infrastructure. The
emphasis is put on security audit method to find gaps in the critical
infrastructure security. The theoretical part describes objects of the
critical infrastructure. The practical part describes using of the
security audit method. The main emphasis was put on the protection
of the critical infrastructure in the Czech Republic.
Abstract: At a global level, water stewardship, water stress and
water security are crucial factors in tourism planning and
development considerations. Challenges associated with water is of
particular concern to the Maldives as there is limited availability of
freshwater, high dependency on desalinated water, and high unit cost
associated with desalinating water. While the Maldives is promoted
as an example of sustainable tourism, a key sustainability challenge
facing tourism dependent communities is the efficient use and
management of available water resources. A water crisis event in the
capital island of Maldives highlighted how precarious water related
issues are in this tourism dependent destination. Applying
netnography, the focus of this working paper is to present community
perceptions of how government policies addressed Malé Water and
Sewerage Company (MWSC) water crisis event.
Abstract: The purpose of this paper is to contribute to the
enhancement of a hydroelectric plant protection by coordinating
protection measures / existing security and introducing new measures
under a risk management process. In addition, plan identifies key
critical elements of a hydroelectric plant, from its level vulnerabilities
and threats it is subjected to in order to achieve the necessary
protection measures to reduce the level of risk.
Abstract: In turbulent modern economy, the companies need to
properly manage their business processes. Well-defined and stable
business processes ensure security of crucial data and applications,
and provide a quality product or service to the end customer. On the
other side, constant changes on the market, new regulatory
provisions, and emerging new technologies require the need of
issuing prompt and effective changes of business process. In this
article, we explore the use of agile principles in working with
business process management (BPM) solutions. We deal with
difficulties in BPM development cycle, review the benefits of using
agility, and choose the basic agile principles that ensure the success
of a BPM project.
Abstract: This paper presents the design and implementation
details of a complete unmanned aerial system (UAS) based
on commercial-off-the-shelf (COTS) components, focusing on
safety, security, search and rescue scenarios in GPS-denied
environments. In particular, The aerial platform is capable
of semi-autonomously navigating through extremely low-light,
GPS-denied indoor environments based on onboard sensors only,
including a downward-facing optical flow camera. Besides, an
additional low-cost payload camera system is developed to stream
both infra-red video and visible light video to a ground station in
real-time, for the purpose of detecting sign of life and hidden humans.
The total cost of the complete system is estimated to be $1150,
and the effectiveness of the system has been tested and validated
in practical scenarios.
Abstract: Detecting changes in multiple images of the same
scene has recently seen increased interest due to the many
contemporary applications including smart security systems, smart
homes, remote sensing, surveillance, medical diagnosis, weather
forecasting, speed and distance measurement, post-disaster forensics
and much more. These applications differ in the scale, nature, and
speed of change. This paper presents an application of image
processing techniques to implement a real-time change detection
system. Change is identified by comparing the RGB representation of
two consecutive frames captured in real-time. The detection threshold
can be controlled to account for various luminance levels. The
comparison result is passed through a filter before decision making to
reduce false positives, especially at lower luminance conditions. The
system is implemented with a MATLAB Graphical User interface
with several controls to manage its operation and performance.
Abstract: One of the challenges that higher education faces is to
find how to approach the sustainability in an inclusive way to the
student within all the different academic areas, how to move the
sustainable development from the abstract field to the operational
field. This research comes from the ecoliteracy and the pedagogical
praxis as tools for rebuilding the teaching processes inside of
universities. The purpose is to determine and describe which are the
factors involved in the process of learning particularly in the
Greenhouse-School Siembra UV. In the Greenhouse-School Siembra UV, of the University of
Veracruz, are cultivated vegetables, medicinal plants and small
cornfields under the usage of eco-technologies such as hydroponics,
Wickingbed and Hugelkultur, which main purpose is the saving of
space, labor and natural resources, as well as function as agricultural
production alternatives in the urban and periurban zones. The sample was formed with students from different academic
areas and who are actively involved in the greenhouse, as well as
institutes from the University of Veracruz and governmental and nongovernmental
departments. This project comes from a pedagogic praxis approach, from filling
the needs that the different professional profiles of the university
students have. All this with the purpose of generate a pragmatic
dialogue with the sustainability. It also comes from the necessity to
understand the factors that intervene in the students’ praxis. In this
manner is how the students are the fundamental unit in the sphere of
sustainability. As a result, it is observed that those University of Veracruz
students who are involved in the Greenhouse-school, Siembra UV,
have enriched in different levels the sense of urban and periurban
agriculture because of the diverse academic approaches they have
and the interaction between them. It is concluded that the ecotechnologies
act as fundamental tools for ecoliteracy in society,
where it is strengthen the nutritional and food security from a
sustainable development approach.
Abstract: The energy need is growing rapidly due to the
population growth and the large new usage of power. Several works
put considerable efforts to make the electricity grid more intelligent
to reduce essentially energy consumption and provide efficiency and
reliability of power systems. The Smart Grid is a complex
architecture that covers critical devices and systems vulnerable to
significant attacks. Hence, security is a crucial factor for the success
and the wide deployment of Smart Grids. In this paper, we present
security issues of the Smart Grid architecture and we highlight open
issues that will make the Smart Grid security a challenging research
area in the future.
Abstract: Household waste form a larger proportion of waste
generated across the state, accumulation of organic waste is an
apparent problem and the existing dump sites could be overstress.
Niger state has abundant arable land and water resources thus should
be one of the highest producers of agricultural crops in the country.
However, the major challenge to agricultural sector today is loss of
soil nutrient coupled with high cost of fertilizer. These have
continued to increase the use of fertilizer and decomposed solid waste
for enhance agricultural yield, which have varying effects on the soil
as well a threat to human livelihood. Consequently, vegetable yield
samples from poultry droppings, decomposed household waste
manure, NPK treatments and control from each replication were
subjected to proximate analysis to determine the nutritional and antinutritional
component as well as heavy metal concentration. Data
collected was analyzed using SPSS software and Randomized
complete Block Design means were compared. The result shows that
the treatments do not devoid the concentrations of any nutritional
components while the anti-nutritional analysis proved that NPK had
higher oxalate content than control and organic treats. The
concentration of lead and cadmium are within safe permissible level
while the mercury level exceeded the FAO/WHO maximum
permissible limit for the entire treatments depicts the need for urgent
intervention to minimize mercury levels in soil and manure in order
to mitigate its toxic effect. Thus, eco-agriculture should be widely
accepted and promoted by the stakeholders for soil amendment,
higher yield, strategies for sustainable environmental protection, food
security, poverty eradication, attainment of sustainable development
and healthy livelihood.
Abstract: With the increasing population and intensive land use,
huge traffic demand is generating worldwide both in developing and
developed countries. As a developing country, Bangladesh is also
facing the same problem in recent years by producing huge numbers
of daily trips. As a matter of fact, extensive traffic demand is
increasing day by day. Also, transport system in Dhaka is
heterogeneous, reflecting the heterogeneity in the socio-economic
and land use patterns. Trips produced here are for different purposes
such as work, business, educational etc. Due to the significant
concentration of educational institutions a large share of the trips are
generated by educational purpose. And one of the major percentages
of educational trips is produced by university going students and
most of them are travelled by car, bus, train, taxi, rickshaw etc. The
aim of the study was to find out the university students’ perception on
public transit ridership. A survey was conducted among 330 students
from eight different universities. It was found out that 26% of the
trips produced by university going students are travelled by public
bus service and only 5% are by train. Percentage of car share is 16%
and 12% of the trips are travelled by private taxi. It has been
observed from the study, students those who prefer bus instead of
other options, 42 percent of their family resides outside Dhaka. And
those who prefer walking, of them, over 40 percent students’ family
reside outside of Dhaka and of them over 85 percent students have a
tendency to live in a mess. On the contrary, students travelling by car
represents, most of their family reside in Dhaka. The study also
revealed that the most important reason that restricts students not to
use public transit is poor service. Negative attitudes such as
discomfort, uneasiness in using public transit also reduces the usage
of public transit. The poor waiting area is another major cause of not
using public transit. Insufficient security also plays a significant role
in not using public transit. On the contrary, the fare is not a problem
for students those who use public transit as a mode of transportation.
Students also think stations are not far away from their home or
institution and they do not need to wait long for the buses or trains. It
was also found accessibility to public transit is moderate.