10 research outputs found
Recommended from our members
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
5G represents the next major phase of mobile telecommunication systems and network architectures beyond the current 4G standards, aiming at extreme broadband and ultra-robust, low latency connectivity, to enable the programmable connectivity for the Internet of Everything2. Despite the significant debate on the technical specifications and the technological maturity of 5G, which are under discussion in various fora3, 5G is expected to affect positively and significantly several industry sectors ranging from ICT to industry sectors such as car and other manufacturing, health and agriculture in the period up to and beyond 2020. 5G will be driven by the influence of software on network functions, known as Software Defined Networking (SDN) and Network Function Virtualization (NFV). The key concept that underpins SDN is the logical centralization of network control functions by decoupling the control and packet forwarding functionality of the network. NFV complements this vision through the virtualization of these functionalities based on recent advances in general server and enterprise IT virtualization. Considering the technological maturity of the technologies that 5G can leverage on, SDN is the one that is moving faster from development to production. To realize the business potential of SDN/5G, a number of technical issues related to the design and operation of Software Defined Networks need to be addressed. Amongst them, SDN/5G security is one of the key issues, that needs to be addressed comprehensively in order to avoid missing the business opportunities arising from SDN/5G. In this report, we review threats and potential compromises related to the security of SDN/5G networks. More specifically, this report contains a review of the emerging threat landscape of 5G networks with particular focus on Software Defined Networking. It also considers security of NFV and radio network access. To provide a comprehensive account of the emerging threat SDN/5G landscape, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by the identified threats and risks, this report has also reviewed and identified existing security mechanisms and good practices for SDN/5G/NFV, and based on these it has analysed gaps and provided technical, policy and organizational recommendations for proactively enhancing the security of SDN/5G
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies
Erbil Citadel Landscape Assessment In Order To Regional Best Practices
Many heritage areas around the world are suffered from neglect in maintenance or
rehabilitation, and never consider their historical values as an attraction places for
visitors, in addition to these problems a lot of ancient buildings were removed in
different old cities and a new modern constructions were shown instead of traditional
ones, and that leads to visual and structural distortion and thus a problem in tourism.
The area surrounding the citadel of Erbil suffered from many of these troubles, thus we
have to focus on them, and present suggestions to solve the problems by presenting a
world successful experience in this fiel
Sustainability In Construction Projects: Part 2 (Case Studies)
The guideline developed in a companion study by the authors is applied and studied in
this work to assess the sustainability score of several big construction projects in
Kurdistan Region of Iraq. Results were varied as the sustainability measures being
applied on certain steps and neglected on many others .Attention on this issue can be
found in the conclusions
Environmental Pollution and Impacts of Dust Storms on the Traffic Safety
The study aims to investigate the negative effect that the dust storms leave on the
human health in general and on the traffic safety as well. Five represented samples
of the dust have been collected from the storms which occurred during (2009 and
2010) in Tikrit city/ north of Iraq to find it's particle size distribution, existence of
heavy metals, and radioactive minerals, in addition, a survey that consists from 70
samples has been collected to examine the driving difficulty during such condition.
Grain size analysis show that the silt size forming the majority (62.6% ), fine sand
(23.52%) and clay (13.88%) , also CaCO3 and organic content have been
determined with average (25.9%) and (2.11%) respectively. The heavy metals
including Cd, Ni, Pb, Cr, Co, and Zn showing that Zn , Ni, Co and Cr are more than
the standards in the crust of the earth which considered pollutant elements while Cd
and Pb are less than the standards. It was found that 92% of the drivers face
difficulty during driving in dusty weather, 47% of the drivers has health problems
concerns the dusty weather and 20% of them tend to change their destination or drive
faster when they face dust storm while drivin
Applications Of Geographic Information Systems In Construction Management
Construction management is one of the fields of Civil Engineering. It includes planning,
analyzing, coordinating and controlling of sequential activities in construction site. The
primary goals of construction management are to minimize the loss of time and
construction costs by appropriate materials, adequate labor and resource selection.
These objectives can be achieved by current and updated continuous information flow
between participants and departments of construction organization. When information
sharing doesn鈥檛 happen effectively and timely it results delays and additional costs at the
construction projects. Information technology has become prominent position in the
development of technology. It supplies some opportunities to construction industry. One
of the important parts of information technology is geographic information systems. It
provides effective solutions to the locational based problems so they are used in many
areas. The possibilities of using GIS in construction management and new models have
been developed in various countries in the world in recent years. In this study, using
GIS in construction management is investigated and a new method in construction
management is tried to develop by use of GIS. Another aim is to supervise all data
related with construction on a single platform. A new office block in Erbil is determined
as a case study. Project drawings of the building are brought to three-dimensional form
in GIS and it is visualized according to the data in the schedule of construction.
Database support and visualization feature of GIS is put forward in this paper
Prediction of Time-Dependent Deflection of High Strength Concrete Panels
This work presents a model for predicting analytically the time dependent deflection
of high strength concrete HSC slabs. This model considers the factors that are
significantly influence the long-term deflection of concrete slabs. Realising the
effect of time on slab flexural rigidity, the proposed method follow the method of
conducting short-term deflection of slabs.The analytical deflection based on the
proposed method are compared with the experimental work conducted by the
authors in 2005 (1) and also with several field measured deflections
RESIDENTIAL BUILDING DEVELOPMENT PROCESS IN KURDISTAN REGION GOVERNMENT
Nowadays, Residential buildings have become the most important part of real-estate
markets in (KRG). The layout of housing in Kurdistan has transformed the face of
major cities across the Region. Rapid changes since 2003, have witnessed copious
architectural structures and large housing projects that have reshaped the landscape
of its cities. The aim of this study is to study the housing developing policy in KRG.
The objectives of the study are to evaluate the KRG's housing development policy
and to investigate the types of house and the price range preferred by the potential
buyer. The study focus on private residential building development projects and it is
carried out by questionnaires and interviews. The respondents are the house buyers
and the developers. A total of 100 questionnaires were distributed to the respondents
and 78 questionnaires were returned duly answered. The data collected is analyzed
using the SPSS (Statistical Package for the Social Sciences) and Average Index. The
results of research indicated that the KRG鈥檚 housing development policy covers the
ownership of the project land, full repatriation of project investment and profits
allowed, import of spare parts tax exempt up to 15% of project cost and the
employment of foreign workers allowed. Moreover, the types of house preferred by
the house buyers are of double storey type and to be of corner lot. The price range
preferred by the potential buyers are between (40,000 to 100,000) USD
Prediction Of Pressure Coefficients For Flat Lip Vertical Gates
The main function of dam structures is to regulate the discharges and heads of water
required to satisfy the demand of power generation and water quantity supplied to river
or stream behind the structure, hence the sluice gate will play the big role to achieve this
process and then its design needs much more attention. The sluice gate within the tunnel
of the dam is exposed to many types of static and hydrodynamic forces .Among these
forces is the hydraulic downpull force which created from difference between
downward force produced by flow passing over the top surface of gate and uplift force
exerted by the jet flow on bottom gate surface . The evaluation of positive and / or
negative downpull force values is important due to its effects on closure of the gate. The
estimation of such force needs determination of many related parameters such as
pressure distribution along and cross the bottom gate surface, top pressure ,jet velocity
issuing below the gate ,operation head and the head downstream the gate shaft. In
present research, the hydraulic model is used to carry out the required measurements
and different types of gate lip shapes have been examined with various flow conditions
and gate openings to evaluate the downpull force coefficient. The analysis of results
assured that the geometry of the lip gate has significant effects on the hydrodynamics
forces and consequently on its operation which in the case of its negative value will
prevent the gate to close and make some failures and damages
Calibraci贸n de un algoritmo de detecci贸n de anomal铆as mar铆timas basado en la fusi贸n de datos satelitales
La fusi贸n de diferentes fuentes de datos aporta una ayuda significativa en el proceso de toma de decisiones. El presente art铆culo describe el desarrollo de una plataforma que permite detectar anomal铆as mar铆timas por medio de la fusi贸n de datos del Sistema de Informaci贸n Autom谩tica (AIS) para seguimiento de buques y de im谩genes satelitales de Radares de Apertura Sint茅tica (SAR). Estas anomal铆as son presentadas al operador como un conjunto de detecciones que requieren ser monitoreadas para descubrir su naturaleza. El proceso de detecci贸n se lleva adelante primero identificando objetos dentro de las im谩genes SAR a trav茅s de la aplicaci贸n de algoritmos CFAR, y luego correlacionando los objetos detectados con los datos reportados mediante el sistema AIS.
En este trabajo reportamos las pruebas realizadas con diferentes configuraciones de los par谩metros para los algoritmos de detecci贸n y asociaci贸n, analizamos la respuesta de la plataforma y reportamos la combinaci贸n de par谩metros que reporta mejores resultados para las im谩genes utilizadas.
Este es un primer paso en nuestro objetivo futuro de desarrollar un sistema que ajuste los par谩metros en forma din谩mica dependiendo de las im谩genes disponibles.XVI Workshop Computaci贸n Gr谩fica, Im谩genes y Visualizaci贸n (WCGIV)Red de Universidades con Carreras en Inform谩tica (RedUNCI