Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


11 - 20 / 52
First pagePrevious page123456Next pageLast page
11.
Analysing security checkpoints for an integrated utility-based information system
Sunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels.
Keywords: information systems, integrated utility system, database security, network security, data security, information system security, e-governance
Published in RUNG: 15.07.2021; Views: 1967; Downloads: 10
URL Link to full text
This document has many files! More...

12.
Sn-modified TiO[sub]2 thin film photocatalysts prepared by low-temperature sol-gel processing : dissertation
Ksenija Maver, 2021, doctoral dissertation

Abstract: Due to many advantageous physiochemical properties, titanium dioxide (TiO2) is the most widely used photocatalyst in numerous applications, such as wastewater treatment and air purification, self-cleaning surfaces and energy conversion (H2 generation). However, one of its disadvantages is the high electron-hole recombination rate, and coupling with other semiconductors is one of the strategies to improve it. The objective of this dissertation was to investigate how the photocatalytic activity of pure TiO2 can be improved by tin modification and to explain the mechanism of increased or hindered photoactivity in correlation with the structural properties of the modified TiO2 photocatalysts. A new low-temperature sol-gel synthesis route was developed to prepare Sn- or SnO2-modified TiO2 photocatalysts. In both cases, organic tin and titanium precursors were used. Tin in the form of Sn cations was used to prepare Sn-modified TiO2. In this case, the precursors went through the sol-gel reaction together to form a Sn-TiO2 sol. In the case of SnO2 modification, the SnO2 sol was prepared separately and additionally mixed with the TiO2 sol to form a TiO2/SnO2 bicomponent semiconductor system. Different molar ratios of tin to titanium were prepared to investigate the correlation between the tin concentration and the photocatalytic properties of the photocatalysts in the form of thin films. The results were used to optimize the synthesis conditions to obtain an improved activity of the modified TiO2 photocatalysts under UV-irradiation. The photocatalytic activity of the thin films was determined by measuring the degradation rate of an azo dye. An increase of up to 40 % in the photocatalytic activity of the dried samples (at 150 °C) was achieved when the TiO2 was modified with the Sn or SnO2 in a concentration range of 0.1 to 1 mol.%. At higher Sn or SnO2 loadings and after calcination of the samples at 500 °C, the photocatalytic activity of the photocatalyst was reduced compared to the unmodified TiO2. Different characterization techniques (UV-Vis, XRD, nitrogen physisorption, TEM, SEM and XAS) were employed to clarify the mechanism responsible for the enhanced and hindered photocatalytic performance of the Sn- and SnO2-modified TiO2 photocatalysts. The results showed that a nanocrystalline structure is already achieved in the samples by the low-temperature film treatment (drying at 150 °C) and that the photocatalytic efficiency is mainly influenced by the crystalline phase composition: anatase/rutile in the case of Sn-modified and TiO2/SnO2 in the case of SnO2-modified TiO2. The crystal size and specific surface area differ insignificantly between the equally thermally treated samples and partly explain the differences in photoefficiency of the calcined samples compared to the dried samples. The structural study at the atomic level, using the Sn K-edge EXAFS, revealed that Sn cations act as nucleation sites for the anatase to rutile transformation in the Sn-modified TiO2 photocatalysts, while in the SnO2-modified TiO2 samples the nanocrystalline cassiterite SnO2 is bound to the TiO2 nanocrystallites via the Sn-O-Ti bond. In both cases, the advantage of coupling the two semiconductors was achieved by separating the charge carriers and thus prolonging their lifetime for accessibility to participate in the redox reactions. The maximum activity enhancement was achieved in the low concentration range (0.1–1 mol.%), which means that an optimal ratio and contact of the two phases are obtained for the given physical parameters, such as particle size, shape and specific surface area of the catalyst.
Keywords: Sn-modified TiO2, SnO2-modified TiO2, low-temperature sol-gel, thin films, photocatalytic activity, anatase/rutile system, Sn K-edge EXAFS, dissertations
Published in RUNG: 09.06.2021; Views: 4364; Downloads: 160
URL Link to full text
This document has many files! More...

13.
Design & analysis of clustering based intrusion detection schemes for e-governance
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: The problem of attacks on various networks and information systems is increasing. And with systems working in public domain like those involved under E-Governance are facing more problems than others. So there is a need to work on either designing an altogether different intrusion detection system or improvement of the existing schemes with better optimization techniques and easy experimental setup. The current study discusses the design of an Intrusion Detection Scheme based on traditional clustering schemes like K-Means and Fuzzy C-Means along with Meta-heuristic scheme like Particle Swarm Optimization. The experimental setup includes comparative analysis of these schemes based on a different metric called Classification Ratio and traditional metric like Detection Rate. The experiment is conducted on a regular Kyoto Data Set used by many researchers in past, however the features extracted from this data are selected based on their relevance to the E-Governance system. The results shows a better and higher classification ratio for the Fuzzy based clustering in conjunction with meta-heuristic schemes. The development and simulations are carried out using MATLAB.
Keywords: particle swarm optimization, intrusion detection, anomaly detection, intrusion detection system, network intrusion detection
Published in RUNG: 02.04.2021; Views: 1981; Downloads: 9
URL Link to full text
This document has many files! More...

14.
Development of e-governance in an emerging economy like India : assessment and way ahead for key components
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, published scientific conference contribution

Abstract: In this paper, we describe the key research questions handled during the doctoral work done in the area of E-Governance. The five research questions in the study are related to the concepts like Development of E-Governance & its assessment, Infrastructure management to reach out to maximum citizens, Various types of Security concerns faced during the E-Governance Development, Analyzing the E-Governance transaction pattern to capture citizen's interest, and finally the way ahead for the E-Governance development through the route of efficiency and optimization in the service designing. The methodology adopted and results obtained for various research questions are discussed at high level. Some portion of the current work is still in progress.
Keywords: e-governance, location allocation, common service centers, intrusion detection system, security, analytics
Published in RUNG: 02.04.2021; Views: 1837; Downloads: 56
URL Link to full text
This document has many files! More...

15.
Implementation & analysis of integrated utility system in developing nation like India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Public utility systems are prevalent around the world but are struggling in developing nations like India to work efficiently. Integration of different utilities can be a possible solution on the technology front, so that more requests can be handled with lesser problems. This study provides the implementation design and benefits of an already proposed integration system by the same authors. It is found that Data Storage, Access Time, Transaction Cost, security cost and server’s busy time can become more effective if the implementation of integration system can be put in place. The working prototype is based on three utilities (Gas, Power & Water) of Delhi-NCR, India.
Keywords: information systems, utility system, India, developing nation
Published in RUNG: 01.04.2021; Views: 1874; Downloads: 56
URL Link to full text
This document has many files! More...

16.
Internet traffic surveillance & network monitoring in India : case study of NETRA
Rajan Gupta, Sunil K. Muttoo, 2016, original scientific article

Abstract: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Keywords: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Published in RUNG: 01.04.2021; Views: 1846; Downloads: 55
URL Link to full text
This document has many files! More...

17.
Electronic properties of phases in the quasi-binary Bi[sub]2Se[sub]3-Bi[sub]2S[sub]3 system
Zipporah Rini Benher, Sandra Gardonio, Mattia Fanetti, Paolo Moras, Asish K. Kundu, Chiara Bigi, Matjaž Valant, 2021, original scientific article

Abstract: We explored the properties of the quasi-binary Bi2Se3–Bi2S3 system over a wide compositional range. X-ray diffraction analysis demonstrates that rhombohedral crystals can be synthesized within the solid solution interval 0–22 mol% Bi2S3, while at 33 mol% Bi2S3 only orthorhombic crystals are obtained. Core level photoemission spectroscopy reveals the presence of Bi3+, Se2− and S2− species and the absence of metallic species, thus indicating that S incorporation into Bi2Se3 proceeds prevalently through the substitution of Se with S. Spin- and angle-resolved photoemission spectroscopy shows that topological surface states develop on the surfaces of the Bi2Se3−ySy (y ≤0.66) rhombohedral crystals, in close analogy with the prototypical case of Bi2Se3, while the orthorhombic crystals with higher S content turn out to be trivial semiconductors. Our results connect unambiguously the phase diagram and electronic properties of the Bi2Se3–Bi2S3 system.
Keywords: topological insulator, quasi-binary Bi2Se3-Bi2S3 system, electronic properties
Published in RUNG: 29.03.2021; Views: 2117; Downloads: 0
This document has many files! More...

18.
New Data Policy in South-East Europe : (related to the SEE-MHEWS-A project)
Klemen Bergant, unpublished conference contribution

Abstract: Conference contribution presents the process of development of a new data policy for the South-East European Multi-Hazard Early Warning Advisory System project (SEE-MHEWS-A Project). The project, led by the World Meteorological Organization, is currently in a demonstration phase. National meteorological and hydrological services (NMHSs) from 17 countries in the South-East Europe are involved in the project. With common SEE-MHEWS Data Policy Agreement the involved NMHSs express their willingness and provide legal framework for the exchange of all available meteorological and hydrological data with a main purpose to improve their meteorological and hydrological forecasts and warnings. The project data policy could be seen as a first step towards the open data policy in the region.
Keywords: Multi-Hazard Early Warning System, Meteorological and Hydorlogical Warnings, Data Exchnage, Data Policy
Published in RUNG: 06.01.2021; Views: 2232; Downloads: 0
This document has many files! More...

19.
Radical Optics: the Film-City of the 1919 Hungarian Commune
Eszter Polonyi, unpublished conference contribution

Keywords: early studio system, Communist cultural politics, Georg Lukacs, urban planning
Published in RUNG: 14.12.2020; Views: 2044; Downloads: 0
This document has many files! More...

20.
Engaging Bodies Through Expanded Art Practice
Asja Apolonia Trost, 2020, master's thesis

Abstract: The master thesis entitled “Engaging Bodies Through Expanded Art Practice” is divided in two parts: the first one is the theoretical part which places socially engaged arts in the time-line of contemporary art, followed by an overview of my practical work entitled “Obsolete Properties”. The central aim of the theoretical part is to determine the structures of socially engaged art projects, with all their ambiguities, caused by the inherent connection between the social and the artistic. Topics of such process-based interdisciplinary and participatory art projects reflect at the same time on cultural traditions as well as on current social issues. The second part is an analysis of the artwork I created and set in different contexts. It consists of common materials that arrived into my hands after their previous owners moved their homes. The artwork celebrates artistic process and environmental sustainability while on the other side serves as an agent on the discourse of values.
Keywords: #ART #ENGAGED_ART #ART_PRACTICE #SOCIAL_PRACTICE #SOCIALLY_ENGAGED_ART #CONTEMPORARY_ART #PROCESS #MEDIA #FORM #PERFORMANCE #PARTICIPATION #COLLABORATION #PUBLIC_SPACE #AESTHETICS #POLITICS #ETHICS #INTERACTIVITY #DESIGN #THEATRE #EDUCATION #AUTHORITY #ART_STUDENT #ART_OBJECT #SYSTEM #KNOWLEDGE #PLASTIC #SCULPTURE #FINE_ARTS #INTERMEDIA_ART #VALUES #FREEDOM_OF_EXPRESION #DOCUMENTATION #AUDIENCE #TRASH #MATERIAL #SUSTAINABILITY #CONSERVATION #CONTEXT #TEMPORARY_EXPERIENCE_ZONE #TEZ #WAR #HOLOCAUST
Published in RUNG: 20.07.2020; Views: 3505; Downloads: 113
.pdf Full text (5,36 MB)
This document has many files! More...

Search done in 0.06 sec.
Back to top