CINXE.COM

Search results for: home security

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: home security</title> <meta name="description" content="Search results for: home security"> <meta name="keywords" content="home security"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="home security" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="home security"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 4184</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: home security</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4184</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4183</span> Context Aware Anomaly Behavior Analysis for Smart Home Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhiwen%20Pan">Zhiwen Pan</a>, <a href="https://publications.waset.org/abstracts/search?q=Jesus%20Pacheco"> Jesus Pacheco</a>, <a href="https://publications.waset.org/abstracts/search?q=Salim%20Hariri"> Salim Hariri</a>, <a href="https://publications.waset.org/abstracts/search?q=Yiqiang%20Chen"> Yiqiang Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Bozhi%20Liu"> Bozhi Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title="Internet of Things">Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=context%20awareness" title=" context awareness"> context awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection" title=" intrusion detection"> intrusion detection</a> </p> <a href="https://publications.waset.org/abstracts/104726/context-aware-anomaly-behavior-analysis-for-smart-home-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104726.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4182</span> Home Education in the Australian Context</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abeer%20Karaali">Abeer Karaali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will seek to clarify important key terms such as home schooling and home education as well as the legalities attached to such terms. It will reflect on the recent proposed changes to terminology in NSW, Australia. The various pedagogical approaches to home education will be explored including their prominence in the Australian context. There is a strong focus on literature from Australia. The historical background of home education in Australia will be explained as well as the difference between distance education and home education. The statistics related to home education in Australia will be explored in the scope and compared to the US. The future of home education in Australia will be discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alternative%20education" title="alternative education">alternative education</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20education" title=" home education"> home education</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20schooling" title=" home schooling"> home schooling</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20resources" title=" online resources"> online resources</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/34419/home-education-in-the-australian-context" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4181</span> The Juxtaposition of Home in Toni Morrison&#039;s Home: Ironic Functions as Trauma and Healing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Imas%20Istiani">Imas Istiani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The concept of home is usually closely related to the place of safety and security. For people who have travelled far and long, they long to be united with home to feel safe, secure and comfortable. However, for some people, especially for veterans, home cannot offer them those feelings, on the contrary, it can give them the sense of insecurity as well as guilty. Thus, its juxtaposed concept can also put home as an uncanny place that represses and haunt its occupant. As for veterans, 'survivor guilt' overpowers them in the way that it will be hard for them to embrace the comfort that home offers. In Home, Toni Morrison poignantly depicts Frank’s life upon returning from the war. Burdened with his traumatic experiences, Frank finds home full with terror, guilt, fear, grief, and loss. Using Dominick laCapra’s 'Trauma Theory,' the study finds that Frank works through his trauma by being able to distinguish between past and present so that he can overcome those repressed feelings. Aside from his inner healing power, Frank digests the process of working through with the help of home and community, as proposed by Evelyn Jaffe Schreiber claiming that community can help survivors to heal from traumatic experiences. Thus, Home has two juxtaposed functions; both as traumatizing and healing place. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trauma" title="trauma">trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=healing" title=" healing"> healing</a>, <a href="https://publications.waset.org/abstracts/search?q=home" title=" home"> home</a>, <a href="https://publications.waset.org/abstracts/search?q=trauma%20theory" title=" trauma theory"> trauma theory</a> </p> <a href="https://publications.waset.org/abstracts/80522/the-juxtaposition-of-home-in-toni-morrisons-home-ironic-functions-as-trauma-and-healing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80522.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4180</span> An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Khattab">Ahmed Khattab</a>, <a href="https://publications.waset.org/abstracts/search?q=Bassem%20Shetta"> Bassem Shetta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raspberry%20Pi" title="Raspberry Pi">Raspberry Pi</a>, <a href="https://publications.waset.org/abstracts/search?q=E-mail" title=" E-mail"> E-mail</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20automation" title=" home automation"> home automation</a>, <a href="https://publications.waset.org/abstracts/search?q=temperature%20sensor" title=" temperature sensor"> temperature sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=PIR%20sensor" title=" PIR sensor"> PIR sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=actuators" title=" actuators"> actuators</a>, <a href="https://publications.waset.org/abstracts/search?q=relay" title=" relay"> relay</a> </p> <a href="https://publications.waset.org/abstracts/93961/an-internet-of-things-based-home-automation-based-on-raspberry-pi-and-node-js-server" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93961.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4179</span> Design and Implementation of a Nano-Power Wireless Sensor Device for Smart Home Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Chi%20Chang">Chia-Chi Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most battery-driven wireless sensor devices will enter in sleep mode as soon as possible to extend the overall lifetime of a sensor network. It is necessary to turn off unnecessary radio and peripheral functions, especially the radio unit always consumes more energy than other components during wireless communication. The microcontroller is the most important part of the wireless sensor device. It is responsible for the manipulation of sensing data and communication protocols. The microcontroller always has different sleep modes, each with a different level of energy usage. The deeper the sleep, the lower the energy consumption. Most wireless sensor devices can only enter the sleep mode: the external low-frequency oscillator is still running to wake up the sleeping microcontroller when the sleep timer expires. In this paper, our sensor device can enter the extended sleep mode: none of the oscillator is running and the wireless sensor device has the nanoampere consumption and self-awaking ability. Finally, these wireless sensor devices were deployed in a smart home security network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title="wireless sensor network">wireless sensor network</a>, <a href="https://publications.waset.org/abstracts/search?q=battery-driven" title=" battery-driven"> battery-driven</a>, <a href="https://publications.waset.org/abstracts/search?q=sleep%20mode" title=" sleep mode"> sleep mode</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20security" title=" home security"> home security</a> </p> <a href="https://publications.waset.org/abstracts/68538/design-and-implementation-of-a-nano-power-wireless-sensor-device-for-smart-home-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68538.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4178</span> Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mojtaba%20Fayaz">Mojtaba Fayaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Richard%20Hallal"> Richard Hallal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=software" title=" software"> software</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware" title=" hardware"> hardware</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20actors" title=" threat actors"> threat actors</a>, <a href="https://publications.waset.org/abstracts/search?q=awareness" title=" awareness"> awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20users" title=" home users"> home users</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=integrity" title=" integrity"> integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=availability" title=" availability"> availability</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a> </p> <a href="https://publications.waset.org/abstracts/149654/security-in-cyberspace-a-comprehensive-review-of-covid-19-continued-effects-on-security-threats-and-solutions-in-2021-and-the-trajectory-of-cybersecurity-going-into-2022" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4177</span> Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Alaka">K. Alaka</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Obi"> A. Obi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20gardening" title=" home gardening"> home gardening</a>, <a href="https://publications.waset.org/abstracts/search?q=household" title=" household"> household</a>, <a href="https://publications.waset.org/abstracts/search?q=income" title=" income"> income</a> </p> <a href="https://publications.waset.org/abstracts/95570/contribution-of-home-gardens-to-rural-household-income-in-raymond-mhlaba-local-municipality-eastern-cape-province-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95570.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">225</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4176</span> The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yllka%20Hysaj">Yllka Hysaj</a>, <a href="https://publications.waset.org/abstracts/search?q=Ylberina%20Hysaj%20Arifi"> Ylberina Hysaj Arifi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=migration" title="migration">migration</a>, <a href="https://publications.waset.org/abstracts/search?q=self-initiated%20expatriates" title=" self-initiated expatriates"> self-initiated expatriates</a>, <a href="https://publications.waset.org/abstracts/search?q=Brexit" title=" Brexit"> Brexit</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20security" title=" job security"> job security</a> </p> <a href="https://publications.waset.org/abstracts/92279/the-impact-of-human-resources-management-on-the-job-security-of-self-initiated-expatriates-after-the-brexit" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92279.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">170</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4175</span> Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omojokun%20G.%20Aju">Omojokun G. Aju</a>, <a href="https://publications.waset.org/abstracts/search?q=Adedayo%20O.%20Sule"> Adedayo O. Sule</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=home%20monitoring" title="home monitoring">home monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE%20802.14.5" title=" IEEE 802.14.5"> IEEE 802.14.5</a>, <a href="https://publications.waset.org/abstracts/search?q=topology" title=" topology"> topology</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20security" title=" wireless security"> wireless security</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network%20%28WSN%29" title=" wireless sensor network (WSN)"> wireless sensor network (WSN)</a>, <a href="https://publications.waset.org/abstracts/search?q=ZigBee" title=" ZigBee"> ZigBee</a> </p> <a href="https://publications.waset.org/abstracts/26439/evaluation-and-analysis-of-zigbee-based-wireless-sensor-network-home-monitoring-as-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26439.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4174</span> A CM-Based Model for 802.11 Networks Security Policies Enforcement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karl%20Mabiala%20Dondia">Karl Mabiala Dondia</a>, <a href="https://publications.waset.org/abstracts/search?q=Jing%20Ma"> Jing Ma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20LAN" title="wireless LAN">wireless LAN</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE%20802.11%20standards" title=" IEEE 802.11 standards"> IEEE 802.11 standards</a>, <a href="https://publications.waset.org/abstracts/search?q=continuous%20monitoring" title=" continuous monitoring"> continuous monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20policy" title=" security policy"> security policy</a> </p> <a href="https://publications.waset.org/abstracts/29260/a-cm-based-model-for-80211-networks-security-policies-enforcement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29260.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4173</span> Household Choice of Working from Home before and after COVID-19</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ravipa%20Rojasavachai">Ravipa Rojasavachai</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yang"> Li Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Working from home has become a global phenomenon after the coronavirus outbreak, and most employees have a choice to choose between working from home or the office. In this paper, we examine the demographics and socio-economics factors influencing individuals’ decision to choose working from home rather than the office before and after the coronavirus outbreak based on Australian household data. We find that all factors impact the working from home choice before the coronavirus outbreak, but the number of children turns to an uninfluenced factor on individuals’ choices after the outbreak. We also find that female employees have a higher probability of choosing to work from home after the coronavirus outbreak. This is because they have less concern for their career opportunities and higher wage premium of working from home due to the changing in cultural norms and advanced working from home technologies in companies after the coronavirus outbreak. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=work%20from%20home" title="work from home">work from home</a>, <a href="https://publications.waset.org/abstracts/search?q=telework" title=" telework"> telework</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20working" title=" remote working"> remote working</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19"> COVID-19</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=wage" title=" wage"> wage</a> </p> <a href="https://publications.waset.org/abstracts/154988/household-choice-of-working-from-home-before-and-after-covid-19" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154988.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">108</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4172</span> Adoption of Lean Thinking and Service Improvement for Care Home Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chuang-Chun%20Chiou">Chuang-Chun Chiou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ageing population is a global trend; therefore the need of care service has been increasing dramatically. There are three basic forms of service delivered to the elderly: institution, community, and home. Particularly, the institutional service can be seen as an extension of medical service. The nursing home or so-called care home which is equipped with professional staff and facilities can provide a variety of service including rehabilitation service, short-term care, and long term care. Similar to hospital and other health care service, care home service do need to provide quality and cost-effective service to satisfy the dwellers. The main purpose of this paper is to show how lean thinking and service innovation can be applied to care home operation. The issues and key factors of implementing lean practice are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lean" title="lean">lean</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20improvement" title=" service improvement"> service improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=SERVQUAL" title=" SERVQUAL"> SERVQUAL</a>, <a href="https://publications.waset.org/abstracts/search?q=care%20home%20service" title=" care home service"> care home service</a> </p> <a href="https://publications.waset.org/abstracts/7248/adoption-of-lean-thinking-and-service-improvement-for-care-home-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7248.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">606</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4171</span> Smart Grids Cyber Security Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Imen%20Aouini">Imen Aouini</a>, <a href="https://publications.waset.org/abstracts/search?q=Lamia%20Ben%20Azzouz"> Lamia Ben Azzouz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grids" title="smart grids">smart grids</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20meters" title=" smart meters"> smart meters</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20area%20network" title=" home area network"> home area network</a>, <a href="https://publications.waset.org/abstracts/search?q=neighbor%20area%20network" title=" neighbor area network"> neighbor area network</a> </p> <a href="https://publications.waset.org/abstracts/35303/smart-grids-cyber-security-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35303.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">424</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4170</span> An Investigation into the Effect of Broken Homes on Students Academic Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hafsat%20Mustapha%20Hanga">Hafsat Mustapha Hanga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the this study was to investigate the effect of broken home on students' academic performance. Therefore, it focused on academic performance and Parental care of the student from and intact home from a cognitive motivational perceptive. The broken and intact home and also to find out if they differ in parental care this is done by using 376 subjects out of the population of 21,378. The sample was obtained using stratified random sampling techniques as the population contained sub-groups the study design was ex-post facto. The data was collected using 3 kind of instruments. To test the first and second hypotheses. Junior secondary school placement examination result was obtained to test the academic performance of the boys fron broken home and boys from and boys from intact home and then girl from broken home and girls from intact home.T-Test was used in the analysis of first and second hypotheses. For the third hypotheses two different kind of questionnaires were developed, the first was used to identify student that are from broken home while the second was for testing parental care between the subject. Chi-square was used to analyze the third hypotheses. Alkh the three 3 hypotheses were tested and rejected and were all in favor of student from intact home. The study found that there was a significant difference in the academic performance of the boys from brokeb and boys from intact home. When boys from intact home better then those boys from broken home. It also reveals that a student from a intact from intact home receives good parental care, love and concern than those from broken home.on the strength of these findings the need to establish an institution which will help those parent who have parenting problems was stressed and also the need to foster. Home school partnership was also stressed and advocate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=broken%20homes" title="broken homes">broken homes</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20performance" title=" academic performance"> academic performance</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20%20care" title=" parental care"> parental care</a>, <a href="https://publications.waset.org/abstracts/search?q=foster" title=" foster "> foster </a> </p> <a href="https://publications.waset.org/abstracts/23216/an-investigation-into-the-effect-of-broken-homes-on-students-academic-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">463</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4169</span> Lightweight and Seamless Distributed Scheme for the Smart Home </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Mehran%20Arshad%20Khan">Muhammad Mehran Arshad Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Chengliang%20Wang"> Chengliang Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zou%20Minhui"> Zou Minhui</a>, <a href="https://publications.waset.org/abstracts/search?q=Danyal%20Badar%20Soomro"> Danyal Badar Soomro</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the <em>daily behavior activity</em> of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes <em>seamless distributed Scheme</em> which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual&rsquo;s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=key-session" title=" key-session"> key-session</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensors" title=" wireless sensors"> wireless sensors</a> </p> <a href="https://publications.waset.org/abstracts/84365/lightweight-and-seamless-distributed-scheme-for-the-smart-home" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84365.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">318</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4168</span> A Modified Diminishing Partnership for Home Financing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Yachou">N. Yachou</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Aboulaich"> R. Aboulaich</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Home is a basic necessity for human life, that why home financing takes a large chunk of people’s income. Therefore, Islamic and Conventional Banks try to offer new product in order to respond to customer needs related to home financing. Basing on this fact, we propose a Modified Diminishing Partnership model based on profit and loss sharing to reduce the duration of getting the full shares in the house property. Our proposition will be represented by the rental that customer has to give every month to the bank with redemption to increase his shares on the property of the house. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=home%20financing" title="home financing">home financing</a>, <a href="https://publications.waset.org/abstracts/search?q=interest%20rate" title=" interest rate"> interest rate</a>, <a href="https://publications.waset.org/abstracts/search?q=rental%20rate" title=" rental rate"> rental rate</a>, <a href="https://publications.waset.org/abstracts/search?q=modified%20diminishing%20partnership" title=" modified diminishing partnership"> modified diminishing partnership</a> </p> <a href="https://publications.waset.org/abstracts/45936/a-modified-diminishing-partnership-for-home-financing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45936.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4167</span> Legal Issues of Food Security in Republic of Kazakhstan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20T.%20Aigarinova">G. T. Aigarinova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=agriculture" title=" agriculture"> agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20resources" title=" public resources"> public resources</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20security" title=" economic security"> economic security</a> </p> <a href="https://publications.waset.org/abstracts/4863/legal-issues-of-food-security-in-republic-of-kazakhstan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4863.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4166</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4165</span> Resident-Aware Green Home</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahlam%20Elkilani">Ahlam Elkilani</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayan%20Elsheikh%20Ali"> Bayan Elsheikh Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasha%20Abu%20Romman"> Rasha Abu Romman</a>, <a href="https://publications.waset.org/abstracts/search?q=Amjed%20Al-mousa"> Amjed Al-mousa</a>, <a href="https://publications.waset.org/abstracts/search?q=Belal%20Sababha"> Belal Sababha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The amount of energy the world uses doubles every 20 years. Green homes play an important role in reducing the residential energy demand. This paper presents a platform that is intended to learn the behavior of home residents and build a profile about their habits and actions. The proposed resident aware home controller intervenes in the operation of home appliances in order to save energy without compromising the convenience of the residents. The presented platform can be used to simulate the actions and movements happening inside a home. The paper includes several optimization techniques that are meant to save energy in the home. In addition, several test scenarios are presented that show how the controller works. Moreover, this paper shows the computed actual savings when each of the presented techniques is implemented in a typical home. The test scenarios have validated that the techniques developed are capable of effectively saving energy at homes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=green%20home" title="green home">green home</a>, <a href="https://publications.waset.org/abstracts/search?q=resident%20aware" title=" resident aware"> resident aware</a>, <a href="https://publications.waset.org/abstracts/search?q=resident%20profile" title=" resident profile"> resident profile</a>, <a href="https://publications.waset.org/abstracts/search?q=activity%20learning" title=" activity learning"> activity learning</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/10045/resident-aware-green-home" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10045.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">389</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4164</span> Identifying the Malaysian Perception on the Self-Build Home Concept: Provision of Affordable Housing for MIG </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20M.%20Tawil">N. M. Tawil</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20R.%20Musa"> A. R. Musa</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20I%20Che-Ani"> A. I Che-Ani</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Basri"> H. Basri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is known that rising of house prices recently has affected the home ownership, especially for the future. Hence to overcome the rose of housing prices, the self-build home or DIY concept is perceived as one of the solution. This concept is proposed to be implemented for the future housing design as a strategy in helping the government to provide affordable housing, especially for middle income group to own a landed housing property. This concept is expected to offer a lower housing price for middle-income buyers and provide an opportunity for buyers to design their dream’s home with the self-build home or 'Do It Yourself' (DIY) concept. In order to implement this concept as affordable housing for MIG, the public perceptions and acceptances on the self-build home/ DIY concept itself should be identified. To achieve this aim this study was conducted by using 2 method namely literature review and questionnaire survey. The questionnaire survey was distributed to 200 respondents randomly in Lembah Klang and were analysed through the SPSS program. The results show that respondents are very interested in buying a home that they can have with the appropriate size of the home. Average of them known about Do It Yourself (DIY) concept but none of respondent have implement this concept. Most of respondents were agreed that this DIY method suitable to be implemented in the housing industry in Malaysia and they were agreed that this concept can offer a cheaper housing price because the construction costs were reduced. Moreover by providing a basic home the owner can renovate their home according to their need and financial capability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=affordable%20housing" title="affordable housing">affordable housing</a>, <a href="https://publications.waset.org/abstracts/search?q=Do%20It%20Yourself" title=" Do It Yourself"> Do It Yourself</a>, <a href="https://publications.waset.org/abstracts/search?q=self-Built%20home" title=" self-Built home"> self-Built home</a>, <a href="https://publications.waset.org/abstracts/search?q=perception" title=" perception"> perception</a>, <a href="https://publications.waset.org/abstracts/search?q=middle%20income%20group" title=" middle income group"> middle income group</a> </p> <a href="https://publications.waset.org/abstracts/24992/identifying-the-malaysian-perception-on-the-self-build-home-concept-provision-of-affordable-housing-for-mig" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24992.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">414</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4163</span> A Multi-Perspective, Qualitative Study into Quality of Life for Elderly People Living at Home and the Challenges for Professional Services in the Netherlands</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hennie%20Boeije">Hennie Boeije</a>, <a href="https://publications.waset.org/abstracts/search?q=Renate%20Verkaik"> Renate Verkaik</a>, <a href="https://publications.waset.org/abstracts/search?q=Joke%20Korevaar"> Joke Korevaar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Dutch national policy, it is promoted that the elderly remain living at home longer. They are less often admitted to a nursing home or only later in life. While living at home, it is important that they experience a good quality of life. Care providers in primary care support this. In this study, it was investigated what quality of life means for the elderly and which characteristics care should have that supports living at home longer with quality of life. To explore this topic, a qualitative methodology was used. Four focus groups were conducted: two with elderly people who live at home and their family caregivers, one with district nurses employed in-home care services and one with elderly care physicians working in primary care. Next to this individual interviews were employed with general practitioners (GPs). In total 32 participants took part in the study. The data were thematically analysed with MaxQDA software for qualitative analysis and reported. Quality of life is a multi-faceted term for elderly. The essence of their description is that they can still undertake activities that matter to them. Good physical health, mental well-being and social connections enable them to do this. Own control over their life is important for some. They are of opinion that how they experience life and manage old age is related to their resilience and coping. Key terms in the definitions of quality of life by GPs are also physical and mental health and social contacts. These are the three pillars. Next, to this elderly care, physicians mention security and safety and district nurses add control over their own life and meaningful daily activities. They agree that with frail elderly people, the balance is delicate and a change in one of the three pillars can cause it to collapse like a house of cards. When discussing what support is needed, professionals agree on access to care with a low threshold, prevention, and life course planning. When care is provided in a timely manner, a worsening of the situation can be prevented. They agree that hospital care often is not needed since most of the problems with the elderly have to do with care and security rather than with a cure per se. GPs can consult elderly care physicians to lower their workload and to bring in specific knowledge. District nurses often signal changes in the situation of the elderly. According to them, the elderly predominantly need someone to watch over them and provide them with a feeling of security. Life course planning and advance care planning can contribute to uniform treatment in line with older adults’ wishes. In conclusion, all stakeholders, including elderly persons, agree on what entails quality of life and the quality of care that is needed to support that. A future challenge is to shape conditions for the right skill mix of professionals, cooperation between the professions and breaking down differences in financing and supply. For the elderly, the challenge is preparing for aging. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=elderly%20living%20at%20home" title="elderly living at home">elderly living at home</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20life" title=" quality of life"> quality of life</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20care" title=" quality of care"> quality of care</a>, <a href="https://publications.waset.org/abstracts/search?q=professional%20cooperation" title=" professional cooperation"> professional cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=life%20course%20planning" title=" life course planning"> life course planning</a>, <a href="https://publications.waset.org/abstracts/search?q=advance%20care%20planning" title=" advance care planning"> advance care planning</a> </p> <a href="https://publications.waset.org/abstracts/104436/a-multi-perspective-qualitative-study-into-quality-of-life-for-elderly-people-living-at-home-and-the-challenges-for-professional-services-in-the-netherlands" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104436.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4162</span> The Value of Job Security across Various Welfare Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eithan%20Hourie">Eithan Hourie</a>, <a href="https://publications.waset.org/abstracts/search?q=Miki%20Malul"> Miki Malul</a>, <a href="https://publications.waset.org/abstracts/search?q=Raphael%20Bar-El"> Raphael Bar-El</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=job%20security%20value" title="job security value">job security value</a>, <a href="https://publications.waset.org/abstracts/search?q=employment%20protection%20legislation" title=" employment protection legislation"> employment protection legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo%20bias" title=" status quo bias"> status quo bias</a>, <a href="https://publications.waset.org/abstracts/search?q=expanding%20welfare%20policy" title=" expanding welfare policy"> expanding welfare policy</a> </p> <a href="https://publications.waset.org/abstracts/161025/the-value-of-job-security-across-various-welfare-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4161</span> Network Security Attacks and Defences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranbir%20Singh">Ranbir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepinder%20Kaur"> Deepinder Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticating" title=" authenticating"> authenticating</a> </p> <a href="https://publications.waset.org/abstracts/53007/network-security-attacks-and-defences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4160</span> Soil Organic Carbon and Nutrients in Smallholding Land Uses in Southern Ethiopia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mekdes%20Lulu">Mekdes Lulu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study assessed the soil organic C (SOC) and soil nutrients in smallholding home garden, woodlot, grazing land, and cropland at two soil depths and two sites in Wolaita Zone, southern Ethiopia. The results showed that soil properties were significantly influenced by land use. The home garden had significantly higher (p < 0.05) SOC and soil nutrients when compared to the cropland. When the home garden was compared to the woodlot and grazing land uses, it had significantly higher (p < 0.05) values except in SOC, total N (TN), cation exchange capacity (CEC), and exchangeable Ca. Cropland, in comparison with grazing land and woodlot, had a non-significant difference except TN. The SOC stock (0–40 cm) in the home garden, woodlot, grazing land and cropland was 79.5, 68.0, 65.0, and 58.1 Mg ha–1, respectively. Home garden significantly differed (p <0.05) in SOC only from cropland, and this was attributed not only to the relatively higher organic input in the home garden but also to the little organic matter input and frequently tillage of the cropland. The similar SOC among the home garden, woodlot and grazing lands may imply that the balance between inputs and outputs could be nearly similar for the land uses. Soil TN and CEC had a nearly similar pattern of difference as in SOC among the land uses because of their close relationship with SOC. In general, the land use influence on soil nutrients can be in the order: home garden > wood land » grazing land » cropland, with home garden showing the least difference from the woodlot and the greatest from the cropland. In the agroecosystem, in general, the influence of smallholding home garden on SOC and soil nutrient was marginally different from Eucalyptus woodlot and grazing lands but evidently different from cropland. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cropland" title="cropland">cropland</a>, <a href="https://publications.waset.org/abstracts/search?q=grazing%20land" title=" grazing land"> grazing land</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20garden" title=" home garden"> home garden</a>, <a href="https://publications.waset.org/abstracts/search?q=soc%20stock" title=" soc stock"> soc stock</a>, <a href="https://publications.waset.org/abstracts/search?q=soil%20nutrients" title=" soil nutrients"> soil nutrients</a>, <a href="https://publications.waset.org/abstracts/search?q=woodlot" title=" woodlot"> woodlot</a> </p> <a href="https://publications.waset.org/abstracts/190065/soil-organic-carbon-and-nutrients-in-smallholding-land-uses-in-southern-ethiopia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">26</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4159</span> Advancements in Smart Home Systems: A Comprehensive Exploration in Electronic Engineering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chukwuka%20E.%20V.">Chukwuka E. V.</a>, <a href="https://publications.waset.org/abstracts/search?q=Rowling%20J.%20K."> Rowling J. K.</a>, <a href="https://publications.waset.org/abstracts/search?q=Rushdie%20Salman"> Rushdie Salman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The field of electronic engineering encompasses the study and application of electrical systems, circuits, and devices. Engineers in this discipline design, analyze and optimize electronic components to develop innovative solutions for various industries. This abstract provides a brief overview of the diverse areas within electronic engineering, including analog and digital electronics, signal processing, communication systems, and embedded systems. It highlights the importance of staying abreast of advancements in technology and fostering interdisciplinary collaboration to address contemporary challenges in this rapidly evolving field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20home%20engineering" title="smart home engineering">smart home engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency" title=" energy efficiency"> energy efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=user-centric%20design" title=" user-centric design"> user-centric design</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20frameworks" title=" security frameworks"> security frameworks</a> </p> <a href="https://publications.waset.org/abstracts/176467/advancements-in-smart-home-systems-a-comprehensive-exploration-in-electronic-engineering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4158</span> Onco@Home: Comparing the Costs, Revenues, and Patient Experience of Cancer Treatment at Home with the Standard of Care</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Misplon">Sarah Misplon</a>, <a href="https://publications.waset.org/abstracts/search?q=Wim%20Marneffe"> Wim Marneffe</a>, <a href="https://publications.waset.org/abstracts/search?q=Johan%20Helling"> Johan Helling</a>, <a href="https://publications.waset.org/abstracts/search?q=Jana%20Missiaen"> Jana Missiaen</a>, <a href="https://publications.waset.org/abstracts/search?q=Inge%20Decock"> Inge Decock</a>, <a href="https://publications.waset.org/abstracts/search?q=Dries%20Myny"> Dries Myny</a>, <a href="https://publications.waset.org/abstracts/search?q=Steve%20Lervant"> Steve Lervant</a>, <a href="https://publications.waset.org/abstracts/search?q=Koen%20Vaneygen"> Koen Vaneygen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study was twofold. First, we investigated whether the current funding from the national health insurance (NHI) of home hospitalization (HH) for oncological patients is sufficient in Belgium. Second, we compared patient’s experiences and preferences of HH to the standard of care (SOC). Two HH models were examined in three Belgian hospitals and three home nursing organizations. In a first HH model, the blood draw and monitoring prior to intravenous therapy were performed by a trained home nurse at the patient’s home the day before the visit to the day hospital. In a second HH model, the administration of two subcutaneous treatments was partly provided at home instead of in the hospital. Therefore, we conducted (1) a bottom-up micro-costing study to compare the costs and revenues for the providers (hospitals and home care organizations), and (2) a cross-sectional survey to compare patient’s experiences and preferences of the SOC group and the HH group. Our results show that HH patients prefer HH and none of them wanted to return to SOC, although the satisfaction of patients was not significantly different between the two categories. At the same time, we find that costs associated to HH are higher overall. Comparing revenues with costs, we conclude that the current funding from NHI of HH for oncological patients is insufficient. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cost%20analysis" title="cost analysis">cost analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20insurance" title=" health insurance"> health insurance</a>, <a href="https://publications.waset.org/abstracts/search?q=preference" title=" preference"> preference</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20hospitalization" title=" home hospitalization"> home hospitalization</a> </p> <a href="https://publications.waset.org/abstracts/153551/onco-at-home-comparing-the-costs-revenues-and-patient-experience-of-cancer-treatment-at-home-with-the-standard-of-care" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153551.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4157</span> The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ari%20S.%20Prabowo">Ari S. Prabowo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nia%20Febriyanti"> Nia Febriyanti</a>, <a href="https://publications.waset.org/abstracts/search?q=Haryono%20B.%20Santosa"> Haryono B. Santosa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory" title="laboratory">laboratory</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20protection%20system" title=" physical protection system"> physical protection system</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20culture" title=" security culture"> security culture</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20function" title=" security function"> security function</a> </p> <a href="https://publications.waset.org/abstracts/102746/the-benefits-of-security-culture-for-improving-physical-protection-systems-at-detection-and-radiation-measurement-laboratory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4156</span> Blockchain Solutions for IoT Challenges: Overview</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Ali%20Fatoorchi">Amir Ali Fatoorchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Blockchain" title="Blockchain">Blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a> </p> <a href="https://publications.waset.org/abstracts/142808/blockchain-solutions-for-iot-challenges-overview" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4155</span> Lightweight Synergy IoT Framework for Smart Home Healthcare for the Elderly</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huawei%20Ma">Huawei Ma</a>, <a href="https://publications.waset.org/abstracts/search?q=Wencai%20Du"> Wencai Du</a>, <a href="https://publications.waset.org/abstracts/search?q=Shengbin%20Liang"> Shengbin Liang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smart Home Healthcare technologies for the elderly represent a transformative paradigm that leverages emerging technologies to provide the elderly’ health indicators and daily life monitoring, emergency calls, environmental monitoring, behavior perception, and other services to ensure the health and safety of the elderly who are aging in their own home. However, the excessive complexity in the main adopted framework has affected the acceptance and adoption of the elderly. Therefore, this paper proposes a lightweight synergy architecture of IoT data and service for elderly home smart health environment. It includes the modeling of IoT applications and their workflows, data interoperability, interaction, and storage paradigms to meet the growing needs of older people so that they can lead an active, fulfilling, and quality life. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20home%20healthcare" title="smart home healthcare">smart home healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=independent%20living" title=" independent living"> independent living</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight%20framework" title=" lightweight framework"> lightweight framework</a> </p> <a href="https://publications.waset.org/abstracts/185322/lightweight-synergy-iot-framework-for-smart-home-healthcare-for-the-elderly" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185322.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">53</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=139">139</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=140">140</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=home%20security&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10