Abstract: This paper describes the problem of building secure
computational services for encrypted information in the Cloud
Computing without decrypting the encrypted data; therefore, it meets
the yearning of computational encryption algorithmic aspiration
model that could enhance the security of big data for privacy,
confidentiality, availability of the users. The cryptographic model
applied for the computational process of the encrypted data is the
Fully Homomorphic Encryption Scheme. We contribute a theoretical
presentations in a high-level computational processes that are based
on number theory and algebra that can easily be integrated and
leveraged in the Cloud computing with detail theoretic mathematical
concepts to the fully homomorphic encryption models. This
contribution enhances the full implementation of big data analytics
based cryptographic security algorithm.
Abstract: Livestock is one of the fastest-growing sectors in
agriculture. If carefully managed, have potential opportunities for
economic growth, food sovereignty and food security. In this study
we mainly analyse and compare long-term i.e. for year 2030 climate
variability impact on predicted productivity of meat i.e. beef, mutton
and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i)
climatic-change vulnerability ii) CO2 fertilization and iii) water
scarcity and compare the results with two countries of the region i.e.
Iraq and Yemen. We do the analysis using data from diverse sources,
which was extracted, transformed and integrated before usage. The
collective impact of the three factors had an overall negative effect on
the production of meat for all the three countries, with adverse impact
on Iraq. High similarity was found between CO2 fertilization
(effecting animal fodder) and water scarcity i.e. higher than that
between production of beef and mutton for the three countries
considered. Overall, the three factors do not seem to be favorable for
the three Middle-East countries considered. This points to possibility
of a vegetarian year 2030 based on dependency on indigenous livestock
population.
Abstract: The goal of this study is to identify success factors
that could influence the ISMS self-implementation in government
sector from qualitative perspective. This study is based on a case
study in one of the Malaysian government agency. Semi-structured
interviews involving five key informants were conducted to examine
factors addressed in the conceptual framework. Subsequently,
thematic analysis was executed to describe the influence of each
factor on the success implementation of ISMS. The result of this
study indicates that management commitment, implementer
commitment and implementer competency are part of the success
factors for ISMS self-implementation in Malaysian Government
Sector.
Abstract: The implementation of e-assessment as tool to support
the process of teaching and learning in university has become a
popular technological means in universities. E-Assessment provides
many advantages to the users especially the flexibility in teaching and
learning. The e-assessment system has the capability to improve its
quality of delivering education. However, there still exists a
drawback in terms of security which limits the user acceptance of the
online learning system. Even though there are studies providing
solutions for identified security threats in e-learning usage, there is no
particular model which addresses the factors that influences the
acceptance of e-assessment system by lecturers from security
perspective. The aim of this study is to explore security aspects of eassessment
in regard to the acceptance of the technology. As a result
a conceptual model of secure acceptance of e-assessment is proposed.
Both human and security factors are considered in formulation of this
conceptual model. In order to increase understanding of critical issues
related to the subject of this study, interpretive approach involving
convergent mixed method research method is proposed to be used to
execute the research. This study will be useful in providing more
insightful understanding regarding the factors that influence the user
acceptance of e-assessment system from security perspective.
Abstract: In reference to the legal state in the Thai legal system,
most people understand the minor principles of the legal state form,
which are the principles that can be explained and understood easily
and the results can be seen clearly, especially in the legitimacy of
administrative acts. Therefore, there is no awareness of justice, which
is the fundamental value of Thai law. The legitimacy of administrative
acts requires the administration to adhere to the constitution and
legislative laws in enforcement of the laws. If it appears that the
administrative acts are illegitimate, the administrative court, as the
court of justice, will revoke those acts as if they had never been set in
the legal system, this will affect people’s trust as they are unaware as
to whether the administrative acts that appoint their lives are
legitimate or not. Regarding the revocation of administrative orders
by the administrative court as if those orders had never existed, the
common individual surely cannot be expected to comprehend the
security of their juristic position. Therefore, the legal state does not
require a revocation of the government’s acts to terminate its legal
results merely because those acts are illegitimate, but there should be
considerations and realizations regarding the “The Principle of the
Protection of Legitimate Expectation,” which is a minor principle in
the legal state’s content that focuses on supporting and protecting
legitimate expectations of the juristic position of an individual and
maintaining justice, which is the fundamental value of Thai law.
Abstract: Human motion capture has become one of the major
area of interest in the field of computer vision. Some of the major
application areas that have been rapidly evolving include the
advanced human interfaces, virtual reality and security/surveillance
systems. This study provides a brief overview of the techniques and
applications used for the markerless human motion capture, which
deals with analyzing the human motion in the form of mathematical
formulations. The major contribution of this research is that it
classifies the computer vision based techniques of human motion
capture based on the taxonomy, and then breaks its down into four
systematically different categories of tracking, initialization, pose
estimation and recognition. The detailed descriptions and the
relationships descriptions are given for the techniques of tracking and
pose estimation. The subcategories of each process are further
described. Various hypotheses have been used by the researchers in
this domain are surveyed and the evolution of these techniques have
been explained. It has been concluded in the survey that most
researchers have focused on using the mathematical body models for
the markerless motion capture.
Abstract: Every machine plays roles of client and server
simultaneously in a peer-to-peer (P2P) network. Though a P2P
network has many advantages over traditional client-server models
regarding efficiency and fault-tolerance, it also faces additional
security threats. Users/IT administrators should be aware of risks
from malicious code propagation, downloaded content legality, and
P2P software’s vulnerabilities. Security and preventative measures
are a must to protect networks from potential sensitive information
leakage and security breaches. Bit Torrent is a popular and scalable
P2P file distribution mechanism which successfully distributes large
files quickly and efficiently without problems for origin server. Bit
Torrent achieved excellent upload utilization according to
measurement studies, but it also raised many questions as regards
utilization in settings, than those measuring, fairness, and Bit
Torrent’s mechanisms choice. This work proposed a block selection
technique using Fuzzy ACO with optimal rules selected using ACO.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: Random epistemologies and hash tables have garnered
minimal interest from both security experts and experts in the last
several years. In fact, few information theorists would disagree with
the evaluation of expert systems. In our research, we discover how
flip-flop gates can be applied to the study of superpages. Though
such a hypothesis at first glance seems perverse, it is derived from
known results.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.
Abstract: Motion Tracking and Stereo Vision are complicated,
albeit well-understood problems in computer vision. Existing
softwares that combine the two approaches to perform stereo motion
tracking typically employ complicated and computationally expensive
procedures. The purpose of this study is to create a simple and
effective solution capable of combining the two approaches. The
study aims to explore a strategy to combine the two techniques
of two-dimensional motion tracking using Kalman Filter; and depth
detection of object using Stereo Vision. In conventional approaches
objects in the scene of interest are observed using a single camera.
However for Stereo Motion Tracking; the scene of interest is
observed using video feeds from two calibrated cameras. Using two
simultaneous measurements from the two cameras a calculation for
the depth of the object from the plane containing the cameras is made.
The approach attempts to capture the entire three-dimensional spatial
information of each object at the scene and represent it through a
software estimator object. In discrete intervals, the estimator tracks
object motion in the plane parallel to plane containing cameras and
updates the perpendicular distance value of the object from the plane
containing the cameras as depth. The ability to efficiently track
the motion of objects in three-dimensional space using a simplified
approach could prove to be an indispensable tool in a variety of
surveillance scenarios. The approach may find application from high
security surveillance scenes such as premises of bank vaults, prisons
or other detention facilities; to low cost applications in supermarkets
and car parking lots.
Abstract: As the current status and growth of Indian automobile
industry is remarkable, transportation sectors are the main concern in
terms of energy security and climate change. Due to rising demand of
fuel and its dependency on foreign countries that affects the GDP of
nation, suggests that penetration of electrical vehicle will increase in
near future. So in this context analysis is done if the 10 percent of
conventional vehicles including cars, three wheelers and two
wheelers becomes electrical vehicles in near future which is also a
part of Nations Electric Mobility Mission Plan then the saving which
improves the nation’s economy is analyzed in detail. Whether the
Indian electricity grid is capable of taking this load with current
generation and demand all over the country is also analyzed in detail.
Current situation of Indian grid is analyzed and how the gap between
generation and demand can be reduced is discussed in terms of
increasing generation capacity and energy conservation measures.
Electrical energy conservation measures in Industry and especially in
rural areas have been analyzed to improve performance of Indian
electricity grid in context of electrical vehicle penetration in near
future. Author was a part of Vishvakarma yojna in which energy
losses were measured in 255 villages of Gujarat and solutions were
suggested to mitigate them and corresponding reports was submitted
to the authorities of Gujarat government.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: To date, one of the few comprehensive indicators for
the measurement of food security is the Global Food Security Index
(GFSI). This index is a dynamic quantitative and qualitative
benchmarking model, constructed from 28 unique indicators, that
measures drivers of food security across both developing and
developed countries. Whereas the GFSI has been calculated across a
set of 109 countries, in this paper we aim to present and compare, for
the Middle East and North Africa (MENA), 1) the Food Security
Index scores achieved and 2) the data available on affordability,
availability, and quality of food. The data for this work was taken
from the latest available report published by the creators of the GFSI,
which in turn used information from national and international
statistical sources. MENA countries rank from place 17/109 (Israel,
although with resent political turmoil this is likely to have changed)
to place 91/109 (Yemen) with household expenditure spent in food
ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food
as a share of household consumption in most countries and better
food safety net programs in the MENA have contributed to a notable
increase in food affordability. The region has also, however,
experienced a decline in food availability, owing to more limited
food supplies and higher volatility of agricultural production. In
terms of food quality and safety the MENA has the top ranking
country (Israel). The most frequent challenges faced by the countries
of the MENA include public expenditure on agricultural research and
development as well as volatility of agricultural production. Food
security is a complex phenomenon that interacts with many other
indicators of a country’s wellbeing; in the MENA it is slowly but
markedly improving.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: The transition period of Kosovo society brought
fundamental changes in all the spheres of organizing life. This was
the period when also in the cultural tradition the biggest movement
and an emerging from ‘isolation’ or from the ‘shell’ occurred.
Transformation of the traditional and embracing of the modern began
here. The same was experienced and is currently being experienced
also by Gjakova and its surrounding which is historically renowned
for its great tradition and culture.
The population of this region is actually facing a transition from
the traditional system into the modern one and quite often with huge
leaps.
These ‘movements’ or ‘evolutions’ of the society of this region,
besides the numerous positive things it ‘harvested’, also brought
things that do not at all correspond with their tradition as well as new
criminal occurrences which in the past were not present in this area.
Furthermore, some of the ‘new’ behaviors that are embraced from
other ‘cultures’ and ‘civilizations’, and which are often exceeded, are
quite perturbing. The security situation is also worrying, particularly
following the appearance of some new criminal occurrences.
Therefore, with this research paper we will strive to analyze the
new cultural “intersections” as well as the nature of the origin of
some new very worrying criminal occurrences. We will present there
also some factors inciting into these occurrences, which were
confessed by the persons involved in these criminal occurrences and
who come from this very region.
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: In-memory database systems are becoming popular
due to the availability and affordability of sufficiently large RAM and
processors in modern high-end servers with the capacity to manage
large in-memory database transactions. While fast and reliable inmemory
systems are still being developed to overcome cache misses,
CPU/IO bottlenecks and distributed transaction costs, disk-based data
stores still serve as the primary persistence. In addition, with the
recent growth in multi-tenancy cloud applications and associated
security concerns, many organisations consider the trade-offs and
continue to require fast and reliable transaction processing of diskbased
database systems as an available choice. For these
organizations, the only way of increasing throughput is by improving
the performance of disk-based concurrency control. This warrants a
hybrid database system with the ability to selectively apply an
enhanced disk-based data management within the context of inmemory
systems that would help improve overall throughput.
The general view is that in-memory systems substantially
outperform disk-based systems. We question this assumption and
examine how a modified variation of access invariance that we call
enhanced memory access, (EMA) can be used to allow very high
levels of concurrency in the pre-fetching of data in disk-based
systems. We demonstrate how this prefetching in disk-based systems
can yield close to in-memory performance, which paves the way for
improved hybrid database systems. This paper proposes a novel EMA
technique and presents a comparative study between disk-based EMA
systems and in-memory systems running on hardware configurations
of equivalent power in terms of the number of processors and their
speeds. The results of the experiments conducted clearly substantiate
that when used in conjunction with all concurrency control
mechanisms, EMA can increase the throughput of disk-based systems
to levels quite close to those achieved by in-memory system. The
promising results of this work show that enhanced disk-based
systems facilitate in improving hybrid data management within the
broader context of in-memory systems.
Abstract: The purpose of this study is to examine the possible
link between employee and customer satisfaction. The service
provided by employees, help to build a good relationship with
customers and can help at increasing their loyalty. Published data for
job satisfaction and indicators of customer services of banks were
gathered from relevant published works which included data from
five different countries. The scores of customers and employees
satisfaction of the different published works were transformed and
normalized to the scale of 1 to 100. The data were analyzed and a
regression analysis of the two parameters was used to describe the
link between employee’s satisfaction and customer’s satisfaction.
Assuming that employee satisfaction has a significant influence on
customer’s service and the resulting customer satisfaction, the
reviewed data indicate that employee’s satisfaction contributes
significantly on the level of customer satisfaction in the Banking
sector. There was a significant correlation between the two
parameters (Pearson correlation R2=0.52 P
Abstract: Since large part of electricity is generated by using
fossil based resources, energy is an important agenda for countries. In
this context, renewable energy sources are alternative to conventional
sources due to the depletion of fossil resources, increasing awareness
of climate change and global warming concerns. Solar, wind and
hydropower energy are the main renewable energy sources. Among
of them, since installed capacity of wind power has increased
approximately eight times between 2008 - November of 2014, wind
energy is a promising source for Turkey. Furthermore, signing of
Kyoto Protocol can be accepted as a milestone for Turkey's energy
policy. Turkish Government has announced Vision 2023 (energy
targets by 2023) in 2010-2014 Strategic Plan prepared by Ministry of
Energy and Natural Resources (MENR). Energy targets in this plan
can be summarized as follows: Share of renewable energy sources in
electricity generation is 30% of total electricity generation by 2023.
Installed capacity of wind energy will be 20 GW by 2023. Other
renewable energy sources such as solar, hydropower and geothermal
are encouraged with new incentive mechanisms. Dependence on
foreign energy is reduced for sustainability and energy security. On
the other hand, since Turkey is surrounded by three coastal areas,
wind energy potential is convenient for wind power application. As
of November of 2014, total installed capacity of wind power plants is
3.51 GW and a lot of wind power plants are under construction with
capacity 1.16 GW. Turkish government also encourages the locally
manufactured equipments. In this context, one of the projects funded
by private sector, universities and TUBİTAK names as MILRES is
an important project aimed to promote the use wind energy in
electricity generation. Within this project, wind turbine with 500 kW
power has been produced and will be installed at the beginning of the
2015. After that, by using the experience obtained from the first
phase of the project, a wind turbine with 2.5 MW power will be
manufactured in an industrial scale.