Academic literature on the topic 'Conventional security on future things'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Conventional security on future things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Conventional security on future things"

1

U. Harita, Ms, and K. V.DayaSagar. "A survey on secured internet of things architecture." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 274. http://dx.doi.org/10.14419/ijet.v7i2.7.10596.

Full text
Abstract:
The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.
APA, Harvard, Vancouver, ISO, and other styles
2

Alshehri, Mohammed. "Blockchain-assisted cyber security in medical things using artificial intelligence." Electronic Research Archive 31, no. 2 (2022): 708–28. http://dx.doi.org/10.3934/era.2023035.

Full text
Abstract:
<abstract><p>The Internet of Medical Things (IoMT) significantly impacts our healthcare system because it allows us to track and verify patient medical data before storing it in the cloud for future use. A rapidly expanding platform like IoMT requires high security to keep all data safe. The patient's prescription history and other sensitive information must be encrypted and managed with great care. Nevertheless, it is challenging to determine what data uses are acceptable while protecting patient privacy and security. Understanding the limits of current technologies and envisioning future research paths is crucial for establishing a safe and reliable data environment. An untrustworthy person can communicate with a trustworthy person via blockchain, a decentralized digital ledger that allows for end-to-end communication. Therefore, this research suggests that the healthcare industry with blockchain-integrated cyber-security based on artificial intelligence (BICS-AI) in medical care to preserve medical-related things. Blockchain applications have the potential to consistently identify the most severe, potentially life-threatening mistakes in the medical field. The use of blockchain for decentralized data protection helps to protect patient health records from compromise. With the help of an access control provider (ACP), here came up with a lightweight solution that addresses this issue by allowing the delegating of security operations. Medical data from IoMT and integrated devices can be collected and stored securely and distributed using a conventional in-depth approach combined with blockchain, making it suitable for healthcare professionals such as nursing homes, hospitals, and the healthcare industry where data exchange is required. The research findings indicate that the suggested system is viable and has a 94.84$ \% $ security rate, a security performance of 96.4$ \% $, a success rate of 89.9$ \% $, and a 5.1$ \% $ latency rate compared to traditional methods.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
3

Patil, Shamshekhar S., and Arun Biradar. "Novel authentication framework for securing communication in internet-of-things." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 1092. http://dx.doi.org/10.11591/ijece.v10i1.pp1092-1100.

Full text
Abstract:
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
APA, Harvard, Vancouver, ISO, and other styles
4

Qiu, Xiaoying, Jinwei Yu, Wenying Zhuang, Guangda Li, and Xuan Sun. "Channel Prediction-Based Security Authentication for Artificial Intelligence of Things." Sensors 23, no. 15 (July 27, 2023): 6711. http://dx.doi.org/10.3390/s23156711.

Full text
Abstract:
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) applications owing to their limited flexibility. These challenges arise from the distributed nature of AIoT devices and the involved information, as well as the requirement for short end-to-end latency. To address these challenges, we propose a security authentication scheme that utilizes intelligent prediction mechanisms to detect spoofing attack. Our approach is based on a dynamic authentication method using long short term memory (LSTM), where the edge computing node observes and predicts the time-varying channel information of access devices to detect clone nodes. Additionally, we introduce a Savitzky–Golay filter-assisted high order cumulant feature extraction model (SGF-HOCM) for preprocessing channel information. By utilizing future channel attributes instead of relying solely on previous channel information, our proposed approach enables authentication decisions. We have conducted extensive experiments in actual industrial environments to validate our prediction-based security strategy, which has achieved an accuracy of 97%.
APA, Harvard, Vancouver, ISO, and other styles
5

Qasim, Hiba Adnan, and Rana Saad Mohammed. "Lightweight Steganography Technique in The Internet of Things: A survey." Al-Salam Journal for Engineering and Technology 3, no. 1 (November 18, 2023): 97–108. http://dx.doi.org/10.55145/ajest.2024.03.01.008.

Full text
Abstract:
In the context of the Internet of Things (IoT), lightweight steganography provides a revolutionary combination of technology and security, where data concealment meets the efficiency requirements of IoT devices. Lightweight steganography, as opposed to conventional steganographic methods, focuses on concealing information inside digital content while using the least amount of computer resources and energy. Secure data transfer is essential in the IoT world because linked devices may communicate with one another without interruption. IoT devices may communicate private data discreetly while conserving system resources, thanks to the elegant approach offered by lightweight steganography. This novel method makes use of complex algorithms that gently change data packets, turning them into bearers of hidden information without raising any red flags. The secrecy of IoT ecosystems is strengthened by lightweight steganography's easy integration of covert communication channels. In addition to improving data security, this technology also optimizes bandwidth usage and increases device battery life. A future when linked devices may transmit information safely, effectively, and surreptitiously is predicted as the IoT environment develops. This would usher in a period of unmatched data security and resource optimization.
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Qinghe, Ying Xu, Wanyu Li, and Houbing Song. "Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8404219.

Full text
Abstract:
The Internet of Things (IoT) is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i) dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii) increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.
APA, Harvard, Vancouver, ISO, and other styles
7

S.P. Revathy, N. MadhiVathani, NaafiahFathima, and A. MohammedIlyas. "Prediction and Prevention of Theft in Jewellery Shop." IRO Journal on Sustainable Wireless Systems 5, no. 3 (September 2023): 194–206. http://dx.doi.org/10.36548/jsws.2023.3.002.

Full text
Abstract:
The internet of Things (IoT)-based total security is the most broadly used protection framework introduced by the technological developments. Sensors and cameras play a vital role in detecting movement and alerting the humans in lots of security applications. As these security gadgets are always accompanied with alarm systems, it is more popularly used for preventing the theft in public places like shopping malls and shops. In such areas, conventional CCTV cameras are usually used as it helps in non-stop human tracking, and detections of crimes. The proposed system is also on such intelligent security system capable of identifying mis-happenings in the public places. With real-time image feedback, the proposed device provides the owner with assurance even when they are not around. These studies examine the possibility of implementing automation technologies in the near future to provide complete protective control. The research suggests a fully automated security system that uses alarm messages and the internet of things (IoT) to predict and prevent unwanted activities in the jewellery shop.
APA, Harvard, Vancouver, ISO, and other styles
8

Arora, Priyanka, and Ritu Makani. "Blockchain Integration with AIoT Data Security and Privacy for Sustainability." Journal of Artificial Intelligence and Systems 6, no. 1 (2024): 112–23. http://dx.doi.org/10.33969/ais.2024060108.

Full text
Abstract:
As a primary goal, AIoT (Artificial Intelligence of Things) is the fusion of AI (artificial intelligence) methods with IoT (Internet of Things) infrastructure, which is deployed there to enhance the overall system performance of AIoT. Artificial Intelligence of Things can be used to make Internet of Things operations more efficient, which will enhance data analysis and human-machine interactions. The system's general usefulness is further increased by applying artificial intelligence techniques to convert Internet of Things data into relevant information for improved decision-making processes. The Artificial Intelligence of Things frameworks have a wide range of applications, including eCommerce, logistics operations and control, smart homes, smart farms, intelligent transportation systems, industrial automation and control, eCommerce, secure as well as safe healthcare monitoring, and many more. AIoT frameworks, however, are susceptible to a variety of information security-related assaults, which could result in problems with data security and privacy. Serious repercussions, such as unapproved data updates and leaks, are also brought on by these problems. One particular kind of database is the blockchain. It's a digital record of all the transactions that's distributed throughout the whole network of systems. Data is stored in the blocks that are linked in a chained manner. Compared to conventional security methods, blockchain technology offers greater security and is impervious to tampering. Therefore, to increase security, blockchain can be used in a variety of AIoT applications. A safe authentication architecture for AIoT has been suggested, modelled after a generalised blockchain. The adversarial model, which handles most potential security threats in this kind of communication environment, is also highlighted. This framework is part of the blockchain-envisioned safe authentication framework for the Internet of Things. The suggested framework's numerous applications are also covered. Additionally, certain problems and difficulties with the suggested framework are emphasised. Finally, we also offer some suggestions for future research that are related to the framework that has been suggested.
APA, Harvard, Vancouver, ISO, and other styles
9

B Kolhapuri, Sammed, Sanket V Shenvi, Sheetal R Kulkarni, and Ambika Naik Y. "Survey Paper on “IoT-Driven Aquaponics for Sustainable Agriculture”." IRO Journal on Sustainable Wireless Systems 6, no. 1 (March 2024): 28–47. http://dx.doi.org/10.36548/jsws.2024.1.003.

Full text
Abstract:
Aquaponics is a promising solution to address environmental issues and promote sustainable food production. The Internet of Things (IoT) has enabled substantial advancements in conventional aquaculture with hydroponics. This survey article looks at cutting-edge Internet of Things applications, with a particular focus on their impact on agricultural sustainability. The study evaluates how IoT improves resource utilization and system productivity by thoroughly examining sensor technologies, data analytics, and machine learning approaches. Data security, energy utilization, and system complexity are among the challenges discussed, as are future research initiatives that might improve IoT-driven aquaponics. The survey's purpose is to provide a comprehensive picture of current technologies and to inspire innovation in sustainable agriculture.
APA, Harvard, Vancouver, ISO, and other styles
10

Tok, Yen Xin, Norliza Katuk, and Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.

Full text
Abstract:
Recently, the adoption of smart home technology has been on the rise and becoming a trend for home residents. The development of Internet-of-Things (IoT) technology drives the smart home authentication system with biometric systems such as facial recognition, fingerprint, and voice control techniques. In the context of homeowners, security is always the primary concern. However, conventional home security and the existing smart home security system have some limitations. These techniques use single-factor authentication, which provides limited protection for home security. Therefore, this project proposed a design for smart home multi-factor authentication using facial recognition and a one-time password sent to smartphones for a home security system. Rapid application development was the methodology for conducting this study. A usability evaluation suggested that the proposed smart home multi-factor authentication is acceptable, but some usability issues can be improved in the future.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Conventional security on future things"

1

Kao, Wiyao. "Le contrat portant sur une chose future : essai d’une théorie générale." Electronic Thesis or Diss., Poitiers, 2020. http://www.theses.fr/2020POIT3015.

Full text
Abstract:
L'expression « contrat portant sur une chose future » signifie que les contractants peuvent valablement stipuler que la chose due sera future ; ils peuvent ainsi contracter sur une chose corporelle ou incorporelle qui n'existe pas encore, du moins dans son entièreté. Depuis la vente romaine de chose future, les contrats portant sur une chose future se sont diversifiés. La pratique de ces contrats est devenue courante en raison de leur importance économique. Prenant la mesure de cette diversité et de cette richesse, la réflexion sur le contrat portant sur une chose future a été envisagée sous le propos de théorie générale.Les contrats portant sur une chose future sont des figures familières sans que l'on les remarque forcément. Il convenait de les identifier dans un premier temps. Ce qui les caractérise et que l'on voit rapidement est que, chacun de ces contrats suppose une chose future qui en constitue l'objet ; la présente étude en propose une définition claire et distincte. Ce que l'on perçoit peut-être moins à l'analyse de ces contrats et qui, pourtant, leur est caractéristique, est qu'ils sont toujours des contrats commutatifs et non des contrats aléatoires. Ce trait montre que la théorie romaine de la vente de chose future, telle qu'elle a été toujours présentée, doit être utilisée aujourd'hui avec beaucoup de précautions pour expliquer tout le mécanisme du contrat portant sur une chose future.L'identification du contrat portant sur une chose future s'est poursuivie avec une référence à l'anticipation. Celle-ci est une explication doctrinale de l'article 1130 ancien, alinéa 1er, du Code civil qui disposait : « L'obligation peut avoir pour objet une chose future. » Elle explique aujourd'hui encore, après la réforme du droit des contrats, le nouvel article 1163, alinéa 1er. Ces trois références ou critères (la chose future, l'absence d'aléa et l'anticipation) ont permis d'identifier, d'un côté, les contrats spéciaux portant sur une chose future et, de l'autre côté, les sûretés conventionnelles portant sur une chose future.Après identification des divers contrats portant sur une chose future, il importait d'étudier leur régime juridique dans un second temps. Le contrat portant sur une chose future se distingue par deux règles communes et spécifiques : d'abord la naissance à la charge du débiteur d'une obligation préalable de faire consistant à faire advenir la chose promise en participant à sa création ou en exécutant un autre contrat ; et ensuite, la naissance au profit du créancier d'un droit éventuel, qui est le droit pur et simple en germe. En outre, la plupart des développements sur la validité et sur l'inexécution du contrat portant sur une chose future relèvent du droit commun du contrat. Les problématiques abordées n’ont pas permis de relever des spécificités tenant à l'aspect chose future, objet de la prestation.Sur le plan de la notion et du régime, il y a au total cinq critères et règles communs sur lesquels on peut s'appuyer pour parler de théorie générale du contrat portant sur une chose future
The expression "contract relating to a future thing" means that the contracting parties may validly stipulate that the thing due will be future; they may thus contract on a tangible or intangible thing that does not yet exist, at least in its entirety. Since the Roman sale of a future thing, contracts relating to a future thing have diversified. The practice of these contracts has become commonplace because of their economic importance. Taking the measure of this diversity and richness, reflection on the contract for a future thing has been considered under the heading of general theory. Contracts relating to a future thing are familiar figures without necessarily being noticed. It was necessary to identify them first of all. What characterizes them, and what is quickly apparent, is that each of these contracts presupposes a future thing which constitutes their object; this study proposes a clear and distinct definition of them. What is perhaps less obvious from an analysis of these contracts, and yet characteristic of them, is that they are always commutative contracts and not random contracts. This feature shows that the Roman theory of the sale of a future thing, as it has always been presented, must be used today with great care to explain the whole mechanism of the contract for a future thing. The identification of the contract relating to a future thing continued with a reference to anticipation. This is a doctrinal explanation of former article 1130, paragraph 1, of the Civil Code, which provided: "The subject-matter of an obligation may be a future thing". It explains even today, after the reform of the law of contract, the new article 1163, paragraph 1. These three references or criteria (the future thing, the absence of contingency and anticipation) have made it possible to identify, on the one hand, special contracts relating to a future thing and, on the other hand, contractual securities relating to a future thing. Once the various contracts relating to a future thing had been identified, it was important to study their legal regime in a second stage. A contract relating to a future thing is distinguished by two common and specific rules: first, the debtor is under a prior obligation to do something which consists in making the promised thing happen by participating in its creation or by executing another contract; and second, the creditor has a possible right, which is the pure and simple right in germ, in favour of the creditor. Moreover, most of the developments on the validity and non-performance of a contract relating to a future thing fall under the general law of contract. The problems discussed did not make it possible to identify any specific features relating to the aspect of the future thing, the object of the service.In terms of the concept and the regime, there are a total of five common criteria and rules on which to base a general theory of the contract relating to a thing in the future
APA, Harvard, Vancouver, ISO, and other styles
2

Aqeel, Muhammad. "Internet of Things : Systematic literature review of security and future research." Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.

Full text
Abstract:
The Internet of Things (IoT) is the network of billions of devices, people and services to Interconnect and exchange information and useful data. The IoT applications are highly affirming to increase the level of comfort, efficiency and automations for the user. The high level of security and privacy, authentication and recovery from the attacks is required to implement IoT automated world. In this thesis I am presenting an overview of IoT layer architecture and attacks regarding security from the layer’s perspective. In addition, this thesis will provide an overview to solve the security and privacy threats. Furthermore, this paper discusses the current state of research on IoT security requirements and future research directions with respect to IoT security and privacy, a detailed review of the security challenges and sources of threat in the IoT applications is presented. Finally, this thesis presents the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Bude, Cristian, and Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Full text
Abstract:
Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later aspect leads to major security challenges. Today, IoT is in great need of standardization and clear architectures that describe how this technology should be implemented and how IoT devices interact with each other in a secure manner. The security challenges are rooted in the technology and how information is acquired and manipulated by this technology. This thesis provides an introduction to what the IoT is and how it can be used as well as some of the threats that IoT may face in regards to information security. In addition, the thesis provides the reader with some suggestions about how to potentially solve the fundamental need for authentication and secure communications. The solutions presented are based on both contemporary solutions and technologies that are under development for the future. Contemporary solutions are based on security protocols such as IPSec and DTLS. These protocols are being used in an environment that extends across the Internet and into a 6LoWPAN network. The proposed authentication solution has been developed based on a public key infrastructure and trust models for certificate management. As future work, the thesis presents several research areas where this thesis can be used as a basis. These specialization areas include further analysis of vulnerabilities and an implementation of the proposed solutions.
Internet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt.  Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
APA, Harvard, Vancouver, ISO, and other styles
4

DUSHKU, EDLIRA. "Remote attestation to ensure the security of future Internet of Things services." Doctoral thesis, 2020. http://hdl.handle.net/11573/1382715.

Full text
Abstract:
The Internet of Things (IoT) evolution is gradually reshaping the physical world into smart environments that involve a large number of interconnected resource-constrained devices which collect, process, and exchange enormous amount of (more or less) sensitive information. With the increasing number of interconnected IoT devices and their capabilities to control the environment, IoT systems are becoming a prominent target of sophisticated cyberattacks. To deal with the expanding attack surface, IoT systems require adequate security mechanisms to verify the reliability of IoT devices. Remote attestation protocols have recently gained wide attention in IoT systems as valuable security mechanisms that detect the adversarial presence and guarantee the legitimate state of IoT devices. Various attestation schemes have been proposed to optimize the effectiveness and efficiency of remote attestation protocols of a single IoT device or a group of IoT devices. Nevertheless, some cyber attacks remain undetected by current attestation methods, and attestation protocols still introduce non-negligible computational overheads for resource-constrained devices. This thesis presents the following new contributions in the area of remote attestation protocols that verify the trustworthiness of IoT devices. First, this thesis shows the limitations of existing attestation protocols against runtime attacks which, by compromising a device, may maliciously influence the operation of other genuine devices that interact with the compromised one. To detect such an attack, this thesis introduces the service perspective in remote attestation and presents a synchronous remote attestation protocol for distributed IoT services. Second, this thesis designs, implements and evaluates a novel remote attestation scheme that releases the constraint of synchronous interaction between devices and enables the attestation of asynchronous distributed IoT services. The proposed scheme also attests asynchronously a group of IoT devices, without interrupting the regular operations of all the devices at the same time. Third, this thesis proposes a new approach that aims to reduce the interruption time of the regular work that remote attestation introduces in an IoT device. This approach intends to decrease the computational overhead of attestation by allowing an IoT device to securely offload the attestation process to a cloud service, which then performs attestation independently on the cloud, on behalf of the IoT device.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Conventional security on future things"

1

Sloan, Stanley R. Conventional arms control and Europe's future. New York, N.Y: Foreign Policy Association, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

A, Millen Raymond, and Army War College (U.S.). Strategic Studies Institute., eds. Future war, future battlespace: The strategic role of American landpower. [Carlisle Barracks, PA]: Strategic Studies Institute, U.S. Army War College, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bonen, Zeev. Advanced technology and future warfare. Ramat Gan, Israel: BESA Center, Bar-Ilan University, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Government Accountability Office. Operation Iraqi Freedom: DOD should apply lessons learned concerning the need for security over conventional munitions storage sites to future operations planning : report to congressional committees. [Washington, D.C.]: United States Government Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grauer, Ryan. Conventional Interstate Warfare. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0027.

Full text
Abstract:
This chapter details the challenge European states face in confronting conventional interstate warfare in the post-cold-war era. The European continent has been the site of several interstate conflicts featuring conventional operations since the collapse of the Soviet Union, and European militaries have fought in a number of similar wars waged outside the region. Conventional interstate wars are likely to manifest quite differently in the future from the way they did in the past, sometimes taking the form of ‘hybrid’ wars that involve irregular fighters and strategies alongside more traditional soldiers and efforts, but they will not disappear from the European security landscape in the near to medium term. Accordingly, while there is considerable room for improvement in the strategic allocation of resources, European states’ decisions to spend considerable sums on weaponry, equipment, and training programmes designed to maintain or improve their fighting capabilities in conventional operations are warranted.
APA, Harvard, Vancouver, ISO, and other styles
6

Natalie, Klein. 26 Maritime Security. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198715481.003.0026.

Full text
Abstract:
This chapter assesses maritime security under the 1982 UN Nations Convention on the Law of the Sea (LOSC). It discusses critical issues in contemporary maritime security, highlighting ongoing boundary disputes, transnational crime, and intelligence gathering. It considers the question of what the future may hold for maritime security. It suggests that maritime security will likely remain of fundamental concern and continue to influence legal developments, but perhaps only to the extent that national interests can be asserted and accepted as shared interests.
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Wilson W. S. Emerging Military Technologies. ABC-CLIO, LLC, 2013. http://dx.doi.org/10.5040/9798400645068.

Full text
Abstract:
This book examines emerging defense technologies such as directed energy weapons, nanotech devices, and bioscience applications that have the potential to dominate international relations in the future, just as nuclear weapons and space infrastructure-assisted conventional weapons do now. Emerging Military Technologies: A Guide to the Issues examines the potential of the United States to bring new technologies to deployment in the service of America's security and defense. The work also discusses how other international actors may regard the United States' investment in these high-tech capabilities, identifying possible resultant counter actions, and presents several divergent viewpoints on what the future may bring. The book thoroughly explores three general categories of emerging technologies: autonomous computers, nanotechnology and biotechnology, and the interrelated topics of directed energy weapons and ubiquitous space access. Security studies expert Wilson W.S. Wong balances coverage of today's cutting-edge science and engineering with treatment of real-world concerns of effectiveness, military ethics, and international relations in the 21st century. An invaluable resource for members of the military and intelligence communities, this book also provides general readers with an accessible introduction to these highly technical topics.
APA, Harvard, Vancouver, ISO, and other styles
8

Clark, Robert, Raimond Maurer, and Olivia S. Mitchell. How Persistent Low Returns Will Shape Saving and Retirement. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198827443.003.0001.

Full text
Abstract:
Financial market developments over the past decade have undermined what was once thought to be conventional wisdom about saving, investment, and retirement spending. Foremost among these is the depressingly persistent and extended period of low capital market returns, driving concerns about how to rethink saving and investments in what can be called the ‘new normal.’ This chapter introduces the themes of the book: how we arrived at our current state of affairs and what changes need to be made to achieve adequate retirement incomes for future retirees, and exploring new designs for pension plan sponsors. With increasing life expectancy adding to the problem of low market returns, the chapter urges policymakers to start reforming now to ensure retirement financial security.
APA, Harvard, Vancouver, ISO, and other styles
9

Satpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani, and Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Satpathy, Suneeta, Sachi Nandan Mohanty, Tanupriya Choudhury, Subhendu Kumar Pani, and Bhagirathi Nayak. Wireless Sensor Networks and the Internet of Things: Future Directions and Applications. Apple Academic Press, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Conventional security on future things"

1

Maheshwary, Priti, and Timothy Malche. "Safeguarding the Connected Future: Security in Internet of Things (IoT)." In Internet of Things Security, 55–86. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003338642-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Minh, Quang Tran, Phat Nguyen Huu, Takeshi Tsuchiya, and Michel Toulouse. "Openness in Fog Computing for the Internet of Things." In Future Data and Security Engineering, 343–57. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35653-8_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Puja, Anjana Mishra, and Brojo Kishore Mishra. "The Future Security Solution to the Internet of Things: Biometric Technology." In Internet of Things, 163–74. New York: Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003304609-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arévalo, Rodrigo Alexander Fagua, Octavio José Salcedo Parra, and Juan Manuel Sánchez Céspedes. "Security for the Internet of Things and the Bluetooth Protocol." In Future Data and Security Engineering, 74–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03192-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hamad, Salma Abdalla, Quan Z. Sheng, and Wei Emma Zhang. "Conclusion and Future Directions." In Security Framework for The Internet of Things Applications, 102–8. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003478683-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tôn, Long-Phuoc, Lam-Son Lê, and Hoang-Anh Pham. "Towards a Domain Specific Framework for Wearable Applications in Internet of Things." In Future Data and Security Engineering, 309–24. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70004-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qureshi, Kashif Naseer, Thomas Newe, Rosheen Qazi, and Gwanggil Jeon. "Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends." In Internet of Things, 291–306. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33808-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Srivastava, Gautam, Reza M. Parizi, and Ali Dehghantanha. "The Future of Blockchain Technology in Healthcare Internet of Things Security." In Advances in Information Security, 161–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tan, Soo Fun, Azman Samsudin, and Suraya Alias. "Internet of Things: Security Challenges and Its Future Direction." In 10th International Conference on Robotics, Vision, Signal Processing and Power Applications, 483–88. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6447-1_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abed, Amira Hassan, Mona Nasr, and Basant Sayed. "The Principle Internet of Things (IoT) Security Techniques Framework Based on Seven Levels IoT’s Reference Model." In Internet of Things—Applications and Future, 219–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3075-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Conventional security on future things"

1

Leventi-peetz, Anastasia-maria. "Human Machine Interaction and Security in the era of modern Machine Learning." In 9th International Conference on Human Interaction and Emerging Technologies - Artificial Intelligence and Future Applications. AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1002963.

Full text
Abstract:
It is realistic to describe Artificial Intelligence (AI) as the most important of emerging technologies because of its increasing dominance in almost every field of modern life and the crucial role it plays in boosting high-tech multidisciplinary developments integrated in steady innovations. The implementation of AI-based solutions for real world problems helps to create new insights into old problems and to produce unique knowledge about intractable problems which are too complex to be efficiently solved with conventional methods. Biomedical data analysis, computer-assisted drug discovery, pandemic predictions and preparedness are only but a few examples of applied research areas that use machine learning as a pivotal data evaluation tool. Such tools process enormous amounts of data trying to discover causal relations and risk factors and predict outcomes that for example can change the course of diseases. The growing number of remarkable achievements delivered by modern machine learning algorithms in the last years raises enthusiasm for all those things that AI can do. The value of the global artificial intelligence market was calculated at USD 136.55 billion in 2022 and is estimated to expand at an annual growth rate of 37.3% from 2023 to 2030. Novel machine-learning applications in finance, national security, health, criminal justice, transportation, smart cities etc. justify the forecast that AI will have a disruptive impact on economies, societies and governance. The traditional rule-based or expert systems, known in computer science since decades implement factual, widely accepted knowledge and heuristic of human experts and they operate by practically imitating the decision making process and reasoning functionalities of professionals. In contrast, modern statistical machine learning systems discover their own rules based on examples on the basis of vast amounts of training data introduced to them. Unfortunately the predictions of these systems are generally not understandable by humans and quite often they are neither definite or unique. Raising the accuracy of the algorithms doesn't improve the situation. Various multi-state initiatives and business programs have been already launched and are in progress to develop technical and ethical criteria for reliable and trustworthy artificial intelligence. Considering the complexity of famous leading machine learning models (up to hundreds of billion parameters) and the influence they can exercise for example by creating text and news and also fake news, generate technical articles, identify human emotions, identify illness etc. it is necessary to expand the definition of HMI (Human Machine Interface) and invent new security concepts associated with it. The definition of HMI has to be extended to account for real-time procedural interactions of humans with algorithms and machines, for instance when faces, body movement patterns, thoughts, emotions and so on are considered to become available for classification both with or without the person's consent. The focus of this work will be set upon contemporary technical shortcomings of machine learning systems that render the security of a plethora of new kinds of human machine interactions as inadequate. Examples will be given with the purpose to raise awareness about underestimated risks.
APA, Harvard, Vancouver, ISO, and other styles
2

Sodré, Y., J. Chatten, and M. Liddell. "The Revolution in Marine Geo-Data Acquisition. What Does This Mean for a Future Workforce?" In Offshore Technology Conference Brasil. OTC, 2023. http://dx.doi.org/10.4043/32963-ms.

Full text
Abstract:
Abstract With the strong growth being experienced (and further forecast) within the blue economy, significantly driven by the requirement for energy security, there is increasingly an industry workforce shortage. This shortage alongside the work/life balance expectation of a new generation entering the industry requires a new approach to how we manage our marine operations. The introduction of larger, longer- endurance uncrewed surface vessels (USVs) is not only transforming how these vessels are operated, but also how conventional crewed vessels collect and process geo-data. Improvements in vessel connectivity alongside increased automation and digitalization is driving a major change in the operational model for offshore geo-data collection using onboard, hull-based sensor arrays and onboard remote operated or autonomous vehicle that can be programmed and controlled from a remote location. Advancements in offshore communications, the use of cloud-based processing and data storage, and the infrastructure within a network of onshore remote operations centers that can be located anywhere in the world is enabling a transformation in how geo-data is acquired and processed. These advancements deliver an increase in sustainability, improvement in safety and improving efficiencies, meaning experts are now available for consultation without the burden of additional logistics required to mobilize the field. Likewise, career pathways within the offshore geo-data sector are becoming increasingly more varied with strong technical career opportunities offshore and onshore. This will provide opportunities for a more diverse workforce, and we are seeing a convergence in the operational approach being utilized on both USVs and conventional crewed vessels. This change in the offshore operational model has implications for the workforce currently involved in the industry, from trainee through to the end client, as well as for the future workforce joining our industry. The development of new technologies and the improvement of existing and new production scenarios will allow for a safer work environment and contribute to a sustainable and livable world.
APA, Harvard, Vancouver, ISO, and other styles
3

Kreider, Jan F., and Peter S. Curtiss. "Comprehensive Evaluation of Impacts From Potential, Future Automotive Fuel Replacements." In ASME 2007 Energy Sustainability Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/es2007-36234.

Full text
Abstract:
In modern society, everything from transportation to commerce to food supply is heavily dependent on the availability of cheap and plentiful energy supplies. In the past few years many have realized that the traditional sources of energy — oil and gas — are in limited supply and that we need to prepare for the approaching production maxima. It is in the interest of national economic security to investigate alternative sources of transportation energy before the extraction of existing supplies becomes prohibitively expensive. This meta-study investigates a number of potential fuels and their sources, including: • agricultural solutions - ethanol (corn and cellulosic), • agricultural solutions - biodiesel, • unconventional refining techniques such as coal-to-liquid, • oil shale retorting and tar sand processing, • traditional petroleum sources. The concentration in the current study is on transportation needs, although it is recognized that building space conditioning and electricity consumption are also significant demands for energy. The results are reported for land use, water use, input-to-output energy ratio, and carbon emissions for each fuel cycle and source. Data are given for the cases of 10, 25, and 50 percent displacements of the 2012 predicted transportation energy needs (i.e., the equivalent of 430 million gallons of gasoline per day). Cradle to grave findings indicate that some novel fuels cannot substitute for conventional fuels without consuming more water or land and emitting more greenhouse gases than fuels in use today. The most sustainable direction for the US transportation fuels sector is suggested.
APA, Harvard, Vancouver, ISO, and other styles
4

Hansen, Samuel, and Amin Mirkouei. "Past Infrastructures and Future Machine Intelligence (MI) for Biofuel Production: A Review and MI-Based Framework." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-86150.

Full text
Abstract:
Recent interest in alternative energy sources, particularly biofuels from biomass, is becoming increasingly evident due to energy security and environmental sustainability concerns, such as depletion of conventional energy reserves and carbon footprint effects, respectively. Existing fuels (e.g., biodiesel and ethanol) are neither sustainable nor cost-competitive. There is a need to integrate the recent advanced manufacturing approaches and machine intelligence (MI) techniques (e.g., machine learning and artificial intelligence), targeted on the midstream segment (i.e., pre-/post-conversion processes) of biomass-to-biofuel supply chains (B2BSC). Thus, a comparative review of the existing MI approaches developed in prior studies is performed herein. This review article, additionally, proposes an MI-based framework to enhance productivity and profitability of existing biofuel production processes through intelligent monitoring and control, optimization, and data-driven decision support tools. It is further concluded that a modernized conversion process utilizing MI techniques is essential to seamlessly capture process-level intricacies and enhance techno-economic resilience and socio-ecological integrity of B2BSC.
APA, Harvard, Vancouver, ISO, and other styles
5

Ghorbel, Roukaya, Jamel Chakchak, Hatice Basmacıoğlu Malayoğlu, and Numan S. Çetin. "Hydroponics “Soilless Farming”: The Future of Food and Agriculture – A Review." In International Students Science Congress. Izmir International Guest Student Association, 2021. http://dx.doi.org/10.52460/issc.2021.007.

Full text
Abstract:
It is estimated that the global population will reach approximately 10 billion people by 2050 and 66% of the world population will live in urban areas. This growth in cities creates demand for fresh products to maintain a healthy population, a product that often exposed to a long journey to reach the consumer, not only losing quality and nutritive value in the process, but also requiring a significant cost of fossil fuel for transportation and storage. However, the world’s agricultural land among being limited, is also facing major problems such as pollution, salinization and drought that do not favor crop production. The need for food security has paved the way for landless agriculture, becoming more popular in the urban area and becoming a part of urban farming. This article aims to examine hydroponic technologies to help expand the knowledge of their application in terms of science, origin, dynamics and farming systems. Among the benefits of soilless cultures; reservation of cultivated land for main crops; saving at least 90% of irrigation water; use of almost constant amount of recycled water; successfully growing almost every vegetable crops and having highest productivity compared to conventional agriculture. Therefore, it is an indispensable solution in areas where arable land is not available or in saline-prone areas, in short, wherever there is competition for land and water. The purpose of this study is an overview of soilless farming systems, explaining the most widely used hydroponic system, the importance of water quality, nutrient content, grown crops and ultimately cost benefit in terms of economics.
APA, Harvard, Vancouver, ISO, and other styles
6

Biermann, Hannah, Gian Luca Liehner, Ralf Philipsen, and Martina Ziefle. "Autonomous shuttle or conventional cab? Investigating users’ decision to share a ride." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003795.

Full text
Abstract:
Private motorized transport poses a major challenge for traffic and the environment. Shared mobility might increase traffic efficiency and reduce traffic-related environmental pollution. The use of autonomous shuttles is conceivable for the future, opening further opportunities, e.g., road safety. From the user's point of view, not having their own vehicle can mean a loss of flexibility. Skepticism may arise, e.g., regarding the reliability of a service provider. Research is needed on the general willingness to share a ride, considering individual motivations for or against shared mobility. Regarding autonomous shuttles, there are gaps in knowledge about the extent to which the lack of a human driver on board affects trust and the willingness to use them compared to conventional driving services.MethodWe designed a two-step empirical research approach. Our aims were to investigate 1.perceptions of autonomous shuttles compared to conventional cabs in terms of safety and reliability,2.trust towards and intention to use autonomous shuttles,3.decisions to use an autonomous shuttle or a conventional cab, considering human factors (e.g., personality traits, mobility behavior).In a preliminary qualitative study, guided interviews (language: German) were conducted to explore reasons behind people' s choice to share a ride and to identify factors that influence their well-being and trust. To evaluate how differences in the level of automation might affect attitudes, conventional cabs and autonomous shuttles (both on-demand mobility services) were compared. In sum, 17 adults of different age groups (19 to 58 years) participated. The interviews were transcribed verbatim and analyzed using content analysis. Results were operationalized and measured in an online questionnaire survey (N=182). ResultsIn general, passengers' feeling of safety is relevant for their decision to share a ride. However, safety is perceived and evaluated differently regarding different means of transport. In a conventional cab, safety perception is enhanced by a human driver, especially in emergencies. In the case of autonomous shuttles, road safety is the key in achieving a high sense of security, since it is assumed that the autonomous shuttle, unlike cab drivers, always adheres to the applicable traffic regulations. Participants would prefer a ride in the autonomous shuttle to a cab ride and indicate a high willingness to use it for people other than themselves. For children or care-dependent people, special booking options, e.g., on board-monitoring, are requested. The general willingness to share a ride seems to depend on the perceived importance of car ownership.OutlookOur results contribute to a deeper understanding of attitudes towards novel mobility services. Results clarify which factors determine the general willingness to use shared mobility and which are specific to new and autonomous driving services. They also strengthen the knowledge of predictors for technology trust and acceptance in this context. The practical relevance of our study lies in the possibility to derive design and action recommendations for the user-centred development of autonomous shuttles considering individual needs and demands of different target groups.
APA, Harvard, Vancouver, ISO, and other styles
7

Lencsés, Enikő, and Kornélia Mészáros. "Challenges of Industry 4.0 in Hungarian agriculture." In The European Union’s Contention in the Reshaping Global Economy. Szeged: Szegedi Tudományegyetem Gazdaságtudományi Kar, 2022. http://dx.doi.org/10.14232/eucrge.2022.16.

Full text
Abstract:
Although the technological revolutions in agricultural production are already at stage 5.0, the majority of Hungarian farmers are familiar with the achievements of 4.0 in theory, but most of them still use only elements of stage 2.0. The range of BigData applications goes far beyond production itself and even covers the entire supply chain. It plays a role in global issues such as food safety and sustainable management, and the results of the data from the system are used to improve efficiency. The development of the Internet of Things (IoT), which wirelessly connects agricultural production and supply chain members, will result in a lot of new, realtime data. An important challenge for these changes is to create new business models for farmers, but it also brings with it a number of open regulatory issues, such as data security and data ownership issues. Decision-making issues do not necessarily remain in the hands of farmers, but the data owner can have a major influence on the design and selection of alternatives. Sustainable integration of Big Data resources is a challenge, as it is crucial for the enterprise model. In order to introduce and apply new technologies, it is absolutely necessary to rethink and transform the existing processes. Developments should not be done in isolation, but together with innovative companies and farmers. It is important to keep in mind that in the future, the collection and sharing of data and the different work tools will be compatible with each other, and data transfer will be as simple as possible, keeping security in mind. The present study examines the theoretical effects of BigData applications in comparison to business models used in conventional technology along the business model research issue based on Lindgradt et al. (2009).
APA, Harvard, Vancouver, ISO, and other styles
8

Arora, Aman, Anureet Kaur, Bharat Bhushan, and Himanshu Saini. "Security Concerns and Future Trends of Internet of Things." In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). IEEE, 2019. http://dx.doi.org/10.1109/icicict46008.2019.8993222.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rathnayaka, L. S. D., B. K. M. Nadeetharu, and U. Kulatunga. "Quantity surveyor’s perspective on document management in construction projects: an exploratory study in Sri Lanka." In World Construction Symposium - 2023. Ceylon Institute of Builders - Sri Lanka, 2023. http://dx.doi.org/10.31705/wcs.2023.73.

Full text
Abstract:
Electronic Document Management Systems (EDMS) have become increasingly popular in recent years as construction organisations seek to improve document management efficiency, productivity, and security. However, the Quantity Surveyor (QS), a key stakeholder responsible for construction documentation management, has less adapted to it in the Sri Lankan context. Accordingly, this study used twelve expert interviews to identify the status of documentation management in the Sri Lankan construction industry from a QS perspective. Manual content analysis was used to analyse the findings. Despite the disadvantages, the conventional DMS approach is still prevalent in the Sri Lankan context. Despite the QSs having a basic understanding of the EDMS approach and being willing to transit to EDMS, they are less familiar with EDMS software. In addition, project size, limited availability of technical facilities, and the reluctance of government and professionals cause to continue this adaptation are still a barrier. The findings of this research can be based on future studies on different stakeholder perspectives. Since conventional DMS is proved to be a less efficient solution for the document management of construction projects and EDMS is also difficult to be initiated, these findings can be benchmarked by policymakers to address the identified causes of the issue.
APA, Harvard, Vancouver, ISO, and other styles
10

Obakhena, O. F., T. G. Biambo, J. Alli-Oluwafuyi, and C. Ikiliagwu. "Alpha-28 FastTrack Maturation to Execution – Securing Export Gas Supply." In SPE Nigeria Annual International Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217168-ms.

Full text
Abstract:
Abstract In the global aspiration to meet an ever-increasing energy demand, fossil fuel and indeed natural gas plays a vital role both in energy security and energy transition. Natural gas is also a key driver of industrialization, a requirement for national growth and development. In the Niger Delta, problems with security & sabotage of hydrocarbon liquid evacuation pipelines as well as slippages in gas drilling projects has also led to shortages in gas supply, creating challenges in meeting contractual obligations to customers with attendant loss of revenue in a high oil & gas price regime. To harness Nigeria huge gas reserve in the current business climate, it is pertinent to arrest declining gas production caused by aging reservoirs & maximize utility of available ullage by accelerating maturation of gas resources. Quickly maturing a gas resource to market has become very important to meet contract shortfalls in the short term and to comply with the recent call for sustainable greener and cleaner energy for environmental reasons on a long term. Typically, the maturation and development of a gas project/well takes a minimum of two (2) years from identification to execution. Maturation of Alpha-28 well in the Alpha field, a brown field Niger Delta, Nigeria, took about 12 months from identification to execution. This was achieved by adopting a non-conventional project maturation. This leaner approach, which did not lose any aspect of the project assurance intents of the conventional approach, involved proper framing, risk assessment, scaling, flexibility, and proactive engagement of all relevant stakeholders to ensure alignment. This paper discusses what was done differently, the how and the learnings that are planned to be incorporated into future similar projects.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Conventional security on future things"

1

Tissot, Roger. Latin America's Energy Future. Inter-American Development Bank, December 2012. http://dx.doi.org/10.18235/0006946.

Full text
Abstract:
This discussion paper presents a survey of the changes in Latin America's energy consumption over the last 30 years, before considering the trends that will affect the region in the coming decades. It highlights several important issues, including the growing demand for oil, which has prompted a resurgence of resource nationalism and the revitalization of national oil companies in the region. Regional oil policy has also been boosted by the growth of China, which is now a major player in the Latin American energy sector, as both consumer and financier. Natural gas consumption has also grown in recent years, and the discovery of large non-conventional gas reserves will also alter the energy landscape. Overall, the paper concludes that Latin America has adequate resources to meet its rising energy needs. The challenge for national governments, however, is to find a balance of sources that best provides energy security, meets growing demand, is environmentally sustainable, and can be developed at a competitive cost. For the region with the cleanest energy matrix in the world, the paper recommends that national governments focus on developing renewable resources in order to avoid a greater reliance on fossil fuels.
APA, Harvard, Vancouver, ISO, and other styles
2

Davies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135010.

Full text
Abstract:
The UK government’s Integrated Review of security, defence, development and foreign policy, published in March 2021 alongside a supporting defence command paper, set a new course for UK national security and highlighted opportunities for an innovative approach to international engagement activity. The Integrated Review focused principally on the state threats posed by China’s increasing power and by competitors – including Russia – armed with nuclear, conventional and hybrid capabilities. It also stressed the continuing risks to global security and resilience due to conflict and instability in weakened and failed states. These threats have the potential to increase poverty and inequality, violent extremism, climate degradation and the forced displacement of people, while presenting authoritarian competitors with opportunities to enhance their geopolitical influence. There are moral, security and economic motives to foster durable peace in conflict-prone and weakened regions through a peacebuilding approach that promotes good governance, addresses the root causes of conflict and prevents violence, while denying opportunities to state competitors. The recent withdrawal from Afghanistan serves to emphasize the complexities and potential pitfalls associated with intervention operations in complex, unstable regions. Success in the future will require the full, sustained and coordinated integration of national, allied and regional levers of power underpinned by a sophisticated understanding of the operating environment. The UK armed forces, with their considerable resources and global network, will contribute to this effort through ‘persistent engagement’. This is a new approach to overseas operations below the threshold of conflict, designed as a pre-emptive complement to warfighting. To achieve this, the UK Ministry of Defence (MOD) must develop a capability that can operate effectively in weak, unstable and complex regions prone to violent conflict and crises, not least in the regions on the eastern and southern flanks of the Euro-Atlantic area. The first step must be the development of a cohort of military personnel with enhanced, tailored levels of knowledge, skills and experience. Engagement roles must be filled by operators with specialist knowledge, skills and experience forged beyond the mainstream discipline of combat and warfighting. Only then will individuals develop a genuinely sophisticated understanding of complex, politically driven and sensitive operating environments and be able to infuse the design and delivery of international activities with practical wisdom and insight. Engagement personnel need to be equipped with: An inherent understanding of the human and political dimensions of conflict, the underlying drivers such as inequality and scarcity, and the exacerbating factors such as climate change and migration; - A grounding in social sciences and conflict modelling in order to understand complex human terrain; - Regional expertise enabled by language skills, cultural intelligence and human networks; - Familiarity with a diverse range of partners, allies and local actors and their approaches; - Expertise in building partner capacity and applying defence capabilities to deliver stability and peace; - A grasp of emerging artificial intelligence technology as a tool to understand human terrain; - Reach and insight developed through ‘knowledge networks’ of external experts in academia, think-tanks and NGOs. Successful change will be dependent on strong and overt advocacy by the MOD’s senior leadership and a revised set of personnel policies and procedures for this cohort’s selection, education, training, career management, incentivization, sustainability and support.
APA, Harvard, Vancouver, ISO, and other styles
3

Ossoff, Will, Naz Modirzadeh, and Dustin Lewis. Preparing for a Twenty-Four-Month Sprint: A Primer for Prospective and New Elected Members of the United Nations Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2020. http://dx.doi.org/10.54813/tzle1195.

Full text
Abstract:
Under the United Nations Charter, the U.N. Security Council has several important functions and powers, not least with regard to taking binding actions to maintain international peace and security. The ten elected members have the opportunity to influence this area and others during their two-year terms on the Council. In this paper, we aim to illustrate some of these opportunities, identify potential guidance from prior elected members’ experiences, and outline the key procedures that incoming elected members should be aware of as they prepare to join the Council. In doing so, we seek in part to summarize the current state of scholarship and policy analysis in an effort to make this material more accessible to States and, particularly, to States’ legal advisers. We drafted this paper with a view towards States that have been elected and are preparing to join the Council, as well as for those States that are considering bidding for a seat on the Council. As a starting point, it may be warranted to dedicate resources for personnel at home in the capital and at the Mission in New York to become deeply familiar with the language, structure, and content of the relevant provisions of the U.N. Charter. That is because it is through those provisions that Council members engage in the diverse forms of political contestation and cooperation at the center of the Council’s work. In both the Charter itself and the Council’s practices and procedures, there are structural impediments that may hinder the influence of elected members on the Security Council. These include the permanent members’ veto power over decisions on matters not characterized as procedural and the short preparation time for newly elected members. Nevertheless, elected members have found creative ways to have an impact. Many of the Council’s “procedures” — such as the “penholder” system for drafting resolutions — are informal practices that can be navigated by resourceful and well-prepared elected members. Mechanisms through which elected members can exert influence include the following: Drafting resolutions; Drafting Presidential Statements, which might serve as a prelude to future resolutions; Drafting Notes by the President, which can be used, among other things, to change Council working methods; Chairing subsidiary bodies, such as sanctions committees; Chairing the Presidency; Introducing new substantive topics onto the Council’s agenda; and Undertaking “Arria-formula” meetings, which allow for broader participation from outside the Council. Case studies help illustrate the types and degrees of impact that elected members can have through their own initiative. Examples include the following undertakings: Canada’s emphasis in 1999–2000 on civilian protection, which led to numerous resolutions and the establishment of civilian protection as a topic on which the Council remains “seized” and continues to have regular debates; Belgium’s effort in 2007 to clarify the Council’s strategy around addressing natural resources and armed conflict, which resulted in a Presidential Statement; Australia’s efforts in 2014 resulting in the placing of the North Korean human rights situation on the Council’s agenda for the first time; and Brazil’s “Responsibility while Protecting” 2011 concept note, which helped shape debate around the Responsibility to Protect concept. Elected members have also influenced Council processes by working together in diverse coalitions. Examples include the following instances: Egypt, Japan, New Zealand, Spain, and Uruguay drafted a resolution that was adopted in 2016 on the protection of health-care workers in armed conflict; Cote d’Ivoire, Kuwait, the Netherlands, and Sweden drafted a resolution that was adopted in 2018 condemning the use of famine as an instrument of warfare; Malaysia, New Zealand, Senegal, and Venezuela tabled a 2016 resolution, which was ultimately adopted, condemning Israeli settlements in Palestinian territory; and A group of successive elected members helped reform the process around the imposition of sanctions against al-Qaeda and associated entities (later including the Islamic State of Iraq and the Levant), including by establishing an Ombudsperson. Past elected members’ experiences may offer some specific pieces of guidance for new members preparing to take their seats on the Council. For example, prospective, new, and current members might seek to take the following measures: Increase the size of and support for the staff of the Mission to the U.N., both in New York and in home capitals; Deploy high-level officials to help gain support for initiatives; Partner with members of the P5 who are the informal “penholder” on certain topics, as this may offer more opportunities to draft resolutions; Build support for initiatives from U.N. Member States that do not currently sit on the Council; and Leave enough time to see initiatives through to completion and continue to follow up after leaving the Council.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography