Search results for: efficiency and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8797

Search results for: efficiency and security

8467 Modeling and Prediction of Zinc Extraction Efficiency from Concentrate by Operating Condition and Using Artificial Neural Networks

Authors: S. Mousavian, D. Ashouri, F. Mousavian, V. Nikkhah Rashidabad, N. Ghazinia

Abstract:

PH, temperature, and time of extraction of each stage, agitation speed, and delay time between stages effect on efficiency of zinc extraction from concentrate. In this research, efficiency of zinc extraction was predicted as a function of mentioned variable by artificial neural networks (ANN). ANN with different layer was employed and the result show that the networks with 8 neurons in hidden layer has good agreement with experimental data.

Keywords: zinc extraction, efficiency, neural networks, operating condition

Procedia PDF Downloads 514
8466 Simulation Of Silicon Window Layers For Solar Cells Based Sige

Authors: Boukais Meriem, B. Dennai, A. Ould-Abbas

Abstract:

The efficiency of SiGe solar cells might be improved by a wide-band-gap window layer. In this work we were simulated using the one dimensional simulation program called analysis of microelectronic and photonic structures (AMPS-1D). In the simulation, the thickness of silicon window was varied from 80 to 150 nm. The rest of layer’s thicknesses were kept constant, by varying thickness of window layer the simulated device performance was demonstrate in the form of current-voltage (I-V) characteristics and quantum efficiency (QE).

Keywords: SiGe, AMPS-1D, simulation, conversion, efficiency, quantum efficiency

Procedia PDF Downloads 766
8465 The Influence of Clayey Pellet Size on Adsorption Efficiency of Metal Ions Removal from Waste Printing Developer

Authors: Kiurski S. Jelena, Ranogajec G. Jonjaua, Oros B. Ivana, Kecić S. Vesna

Abstract:

The adsorption efficiency of fired clayey pellets of 5 and 8 mm diameter size for Cu(II) and Zn(II) ions removal from a waste printing developer was studied. In order to investigate the influence of contact time, adsorbent mass and pellet size on the adsorption efficiency the batch mode was carried out. Faster uptake of copper ions was obtained with the fired clay pellets of 5 mm diameter size within 30 minutes. The pellets of 8 mm diameter size showed the higher equilibrium time (60 to 75 minutes) for copper and zinc ions. The results pointed out that adsorption efficiency increases with the increase of adsorbent mass. The maximal efficiency is different for Cu(II) and Zn(II) ions due to the pellet size. Therefore, the fired clay pellets of 5 mm diameter size present an effective adsorbent for Cu(II) ions removal (adsorption efficiency is 63.6%), whereas the fired clay pellets of 8 mm diameter size are the best alternative for Zn(II) ions removal (adsorption efficiency is 92.8%) from a waste printing developer.

Keywords: adsorption efficiency, clayey pellet, metal ions, waste printing developer

Procedia PDF Downloads 273
8464 Energy Efficient Microgrid Design with Hybrid Power Systems

Authors: Pedro Esteban

Abstract:

Today’s electrical networks, including microgrids, are evolving into smart grids. The smart grid concept brings the idea that the power comes from various sources (continuous or intermittent), in various forms (AC or DC, high, medium or low voltage, etc.), and it must be integrated into the electric power system in a smart way to guarantee a continuous and reliable supply that complies with power quality and energy efficiency standards and grid code requirements. This idea brings questions for the different players like how the required power will be generated, what kind of power will be more suitable, how to store exceeding levels for short or long-term usage, and how to combine and distribute all the different generation power sources in an efficient way. To address these issues, there has been lots of development in recent years on the field of on-grid and off-grid hybrid power systems (HPS). These systems usually combine one or more modes of electricity generation together with energy storage to ensure optimal supply reliability and high level of energy security. Hybrid power systems combine power generation and energy storage technologies together with real-time energy management and innovative power quality and energy efficiency improvement functionalities. These systems help customers achieve targets for clean energy generation, they add flexibility to the electrical grid, and they optimize the installation by improving its power quality and energy efficiency.

Keywords: microgrids, hybrid power systems, energy storage, power quality improvement

Procedia PDF Downloads 113
8463 Maximum Efficiency of the Photovoltaic Cells Using a Genetic Algorithm

Authors: Latifa Sabri, Mohammed Benzirar, Mimoun Zazoui

Abstract:

The installation of photovoltaic systems is one of future sources to generate electricity without emitting pollutants. The photovoltaic cells used in these systems have demonstrated enormous efficiencies and advantages. Several researches have discussed the maximum efficiency of these technologies, but only a few experiences have succeeded to right weather conditions to get these results. In this paper, two types of cells were selected: crystalline and amorphous silicon. Using the method of genetic algorithm, the results show that for an ambient temperature of 25°C and direct irradiation of 625 W/m², the efficiency of crystalline silicon is 12% and 5% for amorphous silicon.

Keywords: PV, maximum efficiency, solar cell, genetic algorithm

Procedia PDF Downloads 402
8462 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 58
8461 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals

Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini

Abstract:

Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.

Keywords: food safety, food security, food sovereignty, halal SDG's

Procedia PDF Downloads 355
8460 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community

Authors: Christantus Begealawuh Nchongayi

Abstract:

As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.

Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security

Procedia PDF Downloads 193
8459 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework

Authors: Husnil Khatimah, Fairol Halim

Abstract:

This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.

Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper

Procedia PDF Downloads 429
8458 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: electricity, energy policy, energy security, Malaysia

Procedia PDF Downloads 278
8457 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 288
8456 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 72
8455 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 62
8454 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 69
8453 Measuring Energy Efficiency Performance of Mena Countries

Authors: Azam Mohammadbagheri, Bahram Fathi

Abstract:

DEA has become a very popular method of performance measure, but it still suffers from some shortcomings. One of these shortcomings is the issue of having multiple optimal solutions to weights for efficient DMUs. The cross efficiency evaluation as an extension of DEA is proposed to avoid this problem. Lam (2010) is also proposed a mixed-integer linear programming formulation based on linear discriminate analysis and super efficiency method (MILP model) to avoid having multiple optimal solutions to weights. In this study, we modified MILP model to determine more suitable weight sets and also evaluate the energy efficiency of MENA countries as an application of the proposed model.

Keywords: data envelopment analysis, discriminate analysis, cross efficiency, MILP model

Procedia PDF Downloads 666
8452 An Approach for Detection Efficiency Determination of High Purity Germanium Detector Using Cesium-137

Authors: Abdulsalam M. Alhawsawi

Abstract:

Estimation of a radiation detector's efficiency plays a significant role in calculating the activity of radioactive samples. Detector efficiency is measured using sources that emit a variety of energies from low to high-energy photons along the energy spectrum. Some photon energies are hard to find in lab settings either because check sources are hard to obtain or the sources have short half-lives. This work aims to develop a method to determine the efficiency of a High Purity Germanium Detector (HPGe) based on the 662 keV gamma ray photon emitted from Cs-137. Cesium-137 is readily available in most labs with radiation detection and health physics applications and has a long half-life of ~30 years. Several photon efficiencies were calculated using the MCNP5 simulation code. The simulated efficiency of the 662 keV photon was used as a base to calculate other photon efficiencies in a point source and a Marinelli Beaker form. In the Marinelli Beaker filled with water case, the efficiency of the 59 keV low energy photons from Am-241 was estimated with a 9% error compared to the MCNP5 simulated efficiency. The 1.17 and 1.33 MeV high energy photons emitted by Co-60 had errors of 4% and 5%, respectively. The estimated errors are considered acceptable in calculating the activity of unknown samples as they fall within the 95% confidence level.

Keywords: MCNP5, MonteCarlo simulations, efficiency calculation, absolute efficiency, activity estimation, Cs-137

Procedia PDF Downloads 97
8451 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur

Authors: Sandra Thomas

Abstract:

This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.

Keywords: food security, dietary diversity, household level, socio-economic classes

Procedia PDF Downloads 95
8450 The Measurement of the Multi-Period Efficiency of the Turkish Health Care Sector

Authors: Erhan Berk

Abstract:

The purpose of this study is to examine the efficiency and productivity of the health care sector in Turkey based on four years of health care cross-sectional data. Efficiency measures are calculated by a nonparametric approach known as Data Envelopment Analysis (DEA). Productivity is measured by the Malmquist index. The research shows how DEA-based Malmquist productivity index can be operated to appraise the technology and productivity changes resulted in the Turkish hospitals which are located all across the country.

Keywords: data envelopment analysis, efficiency, health care, Malmquist Index

Procedia PDF Downloads 306
8449 Factors Affecting the Work Efficiency of Employees of Suan Sunandha Rajabhat University

Authors: Unnop Panpuang

Abstract:

The objectives of this project are to study on the work efficiency of the employees, sorted by their profiles, and to study on the relation between job attributes and work efficiency of employees of Suan Sunandha Rajabhat University. The samples used for this study are 292 employees. The statistics used in this study are frequencies, standard deviations, One-way ANOVA and Pearson’s correlation coefficient. Majority of respondent were male with an undergraduate degree, married and lives together. The average age of respondents was between 31-41 years old, married and the educational background are higher than bachelor’s degree. The job attribute is correlated to the work efficiency with the statistical significance level of .01. This concurs with the predetermined hypothesis. The correlation between the two main factors is in the moderate level. All the categories of job attributes such as the variety of skills, job clarity, job importance, freedom to do work are considered separately.

Keywords: employees, job attributes, work efficiency, university

Procedia PDF Downloads 335
8448 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 281
8447 The Used of Ceramic Stove Cover and It’s Gap to the Efficiency of Water Boiling System

Authors: Agung Sugeng Widodo

Abstract:

Water boiling system (WBS) using conventional gas stove (CGS) is relatively inefficient unless its mechanism being considered. In this study, an addition of ceramic stove cover (CSC) to a CGS and the gap between CSC and pan have been assessed. Parameters as energy produced by fuel, CSC temperature and water temperature were used to analyze the performance of a CGS. The gaps were varied by 1 – 7 mm in a step of 1 mm. The results showed that a CSC able to increase the performance of a CGS significantly. In certain fuel rate of 0.75 l/m, the efficiency of a CGS obtained in a gap of 4 mm. The best efficiency obtained in this study was 46.4 % due to the optimum condition that achieved simultaneously in convection and radiation heat transfer processes of the heating system. CSC also indicated a good characteristic for covering heat release at the initially of WBS.

Keywords: WBS, CSC, CGS, efficiency, gap

Procedia PDF Downloads 245
8446 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 52
8445 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 262
8444 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 275
8443 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 399
8442 Effect of Elevation and Wind Direction on Silicon Solar Panel Efficiency

Authors: Abdulrahman M. Homadi

Abstract:

As a great source of renewable energy, solar energy is considered to be one of the most important in the world, since it will be one of solutions cover the energy shortage in the future. Photovoltaic (PV) is the most popular and widely used among solar energy technologies. However, PV efficiency is fairly low and remains somewhat expensive. High temperature has a negative effect on PV efficiency and cooling system for these panels is vital, especially in warm weather conditions. This paper presents the results of a simulation study carried out on silicon solar cells to assess the effects of elevation on enhancing the efficiency of solar panels. The study included four different terrains. The study also took into account the direction of the wind hitting the solar panels. To ensure the simulation mimics reality, six silicon solar panels are designed in two columns and three rows, facing to the south at an angle of 30 o. The elevations are assumed to change from 10 meters to 200 meters. The results show that maximum increase in efficiency occurs when the wind comes from the north, hitting the back of the panels.

Keywords: solar panels, elevation, wind direction, efficiency

Procedia PDF Downloads 271
8441 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 303
8440 Factors Affecting Cost Efficiency of Municipal Waste Services in Tuscan Municipalities: An Empirical Investigation by Accounting for Different Management

Authors: María Molinos-Senante, Giulia Romano

Abstract:

This paper aims at investigating the effect of ownership in the efficiency assessment of municipal solid waste management. In doing so, the Data Envelopment Analysis meta-frontier approach integrating unsorted waste as undesirable output was applied. Three different clusters of municipalities have been created on the basis of the ownership type of municipal waste operators. In the second stage of analysis, the paper investigates factors affecting efficiency, in order to provide an outlook of levers to be used by policy and decision makers to improve efficiency, taking into account different management models in force. Results show that public waste management firms have better performance than mixed and private ones since their efficiency scores are significantly larger. Moreover, it has been demonstrated that the efficiency of waste management firms is statistically influenced by the age of population, population served, municipal size, population density and tourism rate. It evidences the importance of economies of scale on the cost efficiency of waste management. This issue is relevant for policymakers to define and implement policies aimed to improve the long-term sustainability of waste management in municipalities.

Keywords: data envelopment analysis, efficiency, municipal solid waste, ownership, undesirable output

Procedia PDF Downloads 131
8439 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 134
8438 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 71