Search results for: income security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4257

Search results for: income security

3897 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 321
3896 The Adaptive Properties of the Strategic Assurance System of the National Economy Sustainability to the Economic Security Threats

Authors: Badri Gechbaia

Abstract:

Adaptive management as a fundamental element of the concept of the assurance of economy`s sustainability to the economic security of the system-synergetic type has been considered. It has been proved that the adaptive sustainable development is a transitional phase from the extensive one and later on from the rapid growth to the sustainable development. It has been determined that the adaptive system of the strategic assurance of the sustainability of the economy to the economic security threats is formed on the principles of the domination in its complex of the subsystems with weightier adaptive characteristics that negate the destructive influence of external and internal environmental factors on the sustainability of the national economy.

Keywords: adaptive management, adaptive properties, economic security, strategic assurance

Procedia PDF Downloads 499
3895 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 114
3894 Improved Food Security and Alleviation of Cyanide Intoxication through Commercialization and Utilization of Cassava Starch by Tanzania Industries

Authors: Mariam Mtunguja, Henry Laswai, Yasinta Muzanilla, Joseph Ndunguru

Abstract:

Starchy tuberous roots of cassava provide food for people but also find application in various industries. Recently there has been the focus of concentrated research efforts to fully exploit its potential as a sustainable multipurpose crop. High starch yield is the important trait for commercial cassava production for the starch industries. Furthermore, cyanide present in cassava root poses a health challenge in the use of cassava for food. Farming communities where cassava is a staple food, prefer bitter (high cyanogenic) varieties as protection from predators and thieves. As a result, food insecure farmers prefer growing bitter cassava. This has led to cyanide intoxication to this farming communities. Cassava farmers can benefit from marketing cassava to starch producers thereby improving their income and food security. This will decrease dependency on cassava as staple food as a result of increased income and be able to afford other food sources. To achieve this, adequate information is required on the right cassava cultivars and appropriate harvesting period so as to maximize cassava production and profitability. This study aimed at identifying suitable cassava cultivars and optimum time of harvest to maximize starch production. Six commonly grown cultivars were identified and planted in a complete random block design and further analysis was done to assess variation in physicochemical characteristics, starch yield and cyanogenic potentials across three environments. The analysis showed that there is a difference in physicochemical characteristics between landraces (p ≤ 0.05), and can be targeted to different industrial applications. Among landraces, dry matter (30-39%), amylose (11-19%), starch (74-80%) and reducing sugars content (1-3%) varied when expressed on a dry weight basis (p ≤ 0.05); however, only one of the six genotypes differed in crystallinity and mean starch granule particle size, while glucan chain distribution and granule morphology were the same. In contrast, the starch functionality features measured: swelling power, solubility, syneresis, and digestibility differed (p ≤ 0.05). This was supported by Partial least square discriminant analysis (PLS-DA), which highlighted the divergence among the cassavas based on starch functionality, permitting suggestions for the targeted uses of these starches in diverse industries. The study also illustrated genotypic difference in starch yield and cyanogenic potential. Among landraces, Kiroba showed potential for maximum starch yield (12.8 t ha-1) followed by Msenene (12.3 t ha-1) and third was Kilusungu (10.2 t ha-1). The cyanide content of cassava landraces was between 15 and 800 ppm across all trial sites. GGE biplot analysis further confirmed that Kiroba was a superior cultivar in terms of starch yield. Kilusungu had the highest cyanide content and average starch yield, therefore it can also be suitable for use in starch production.

Keywords: cyanogen, cassava starch, food security, starch yield

Procedia PDF Downloads 215
3893 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 370
3892 The Per Capita Income, Energy production and Environmental Degradation: A Comprehensive Assessment of the existence of the Environmental Kuznets Curve Hypothesis in Bangladesh

Authors: Ashique Mahmud, MD. Ataul Gani Osmani, Shoria Sharmin

Abstract:

In the first quarter of the twenty-first century, the most substantial global concern is environmental contamination, and it has gained the prioritization of both the national and international community. Keeping in mind this crucial fact, this study conducted different statistical and econometrical methods to identify whether the gross national income of the country has a significant impact on electricity production from nonrenewable sources and different air pollutants like carbon dioxide, nitrous oxide, and methane emissions. Besides, the primary objective of this research was to analyze whether the environmental Kuznets curve hypothesis holds for the examined variables. After analyzing different statistical properties of the variables, this study came to the conclusion that the environmental Kuznets curve hypothesis holds for gross national income and carbon dioxide emission in Bangladesh in the short run as well as the long run. This study comes to this conclusion based on the findings of ordinary least square estimations, ARDL bound tests, short-run causality analysis, the Error Correction Model, and other pre-diagnostic and post-diagnostic tests that have been employed in the structural model. Moreover, this study wants to demonstrate that the outline of gross national income and carbon dioxide emissions is in its initial stage of development and will increase up to the optimal peak. The compositional effect will then force the emission to decrease, and the environmental quality will be restored in the long run.

Keywords: environmental Kuznets curve hypothesis, carbon dioxide emission in Bangladesh, gross national income in Bangladesh, autoregressive distributed lag model, granger causality, error correction model

Procedia PDF Downloads 141
3891 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 123
3890 Learned Helplessness and Agricultural Investment among Poor Farmers: An Experimental Study in Rural Uganda

Authors: Floris Burgers, Arjan Verschoor

Abstract:

Poor farmers in developing countries typically do not have the resources or access to institutions to protect themselves against all kinds of income shocks, which makes their farm income highly sensitive to weather and crop price fluctuations, and various other intervening forces. Consequently, the relationship between farming effort and farming outcomes can be noisy, potentially resulting in a situation in which farmers perceive little personal control over the outcomes of their farming efforts. This perceived lack of control can result in learned helplessness in some farmers, who would then be less motivated to invest in their farm. This paper presents the results of a household survey and controlled field experiment conducted in ten villages in a farming area in eastern Uganda with a view to examining the link between learned helplessness and agricultural investment. The results show that (I) farmers with a more pessimistic attributional style for negative life events invest less in their farm, (II) an experience of uncontrollability over income in a priming task increases investment in the farm in a subsequent task if losses in the priming task are small, and decreases investment in the subsequent task if losses are moderate or big, and (III) the relationship between the number of income shocks experienced in the past two years and investment in the farm is more negative among farmers with a more pessimistic attributional style. These results are in line with the reformulated learned helplessness theory underlying this research, which leads this paper to conclude that learned helplessness can cause agricultural underinvestment in a developing country context, potentially contributing to a poverty trap.

Keywords: agricultural investment, attributional style, farmers, learned helplessness, poverty, income shocks

Procedia PDF Downloads 210
3889 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 156
3888 Effect of Micro Credit Access on Poverty Reduction among Small Scale Women Entrepreneurs in Ondo State, Nigeria

Authors: Adewale Oladapo, C. A. Afolami

Abstract:

The study analyzed the effect of micro credit access on poverty reduction among small scale women entrepreneurs in Ondo state, Nigeria. Primary data were collected in a cross-sectional survey of 100 randomly selected woman entrepreneurs. These were drawn in multistage sampling process covering four local government areas (LGAS). Data collected include socio economics characteristics of respondents, access to micro credit, sources of micro credit, and constraints faced by the entrepreneur in sourcing for micro credit. Data were analyzed using descriptive statistics, Foster, Greer and Thorbecke (FGT) index of poverty measure, Gini coefficients and probit regression analysis. The study found that respondents sampled for the survey were within the age range of 31-40 years with mean age 38.6%. Mostly (56.0%) of the respondents were educated to the tune of primary school. Majority (87.0%) of the respondents were married with fairly large household size of (4-5). The poverty index analysis revealed that most (67%) of the sample respondents were poor. The result of the Probit regression analyzed showed that income was a significant variable in micro credit access, while the result of the Gini coefficient revealed a very high income inequality among the respondents. The study concluded that most of the respondents were poor and return on investment (income) was an important variable that increased the chance of respondents in sourcing for micro-credit loan and recommended that income realized by entrepreneur should be properly documented to facilitate loan accessibility.

Keywords: entrepreneurs, income, micro-credit, poverty

Procedia PDF Downloads 121
3887 Exploring the Availability and Distribution of Public Green Spaces among Riyadh Residential Neighborhoods

Authors: Abdulwahab Alalyani, Mahbub Rashid

Abstract:

Public green space promotes community health including daily activities, but these resources may not be available enough or may not equitably be distributed. This paper measures and compares the availability of public green spaces (PGS) among low, middle, and high-income neighborhoods in the Riyadh city. Additionally, it compares the total availability of PGS to WHO standard and Dubai availability of PGS per person. All PGS were mapped using geographical information systems, and total area availability of PGS compared to WHO and Dubai standards. To evaluate the significant differences in PGS availability across low, medium, and high-income Riyadh neighborhoods, we used a One-way ANOVA analysis of covariance to test the differences. As a result, by comparing PGS of Riyadh neighborhoods to WHO and Dubai-availability, it was found that Riyadh PGS were lower than the minimum standard of WHO and as well as Dubai. Riyadh has only 1.13 m2 per capita of PGS. The second finding, the availability of PGS, was significantly different among Riyadh neighborhoods based on socioeconomic status. The future development of PGS should be focused on increasing PGS availability and should be given priority to those low-income and unhealthy communities.

Keywords: spatial equity, green space, quality of life, built environment

Procedia PDF Downloads 126
3886 Banking and Accounting Analysis Researches Effect on Environment and Income

Authors: Gerges Samaan Henin Abdalla

Abstract:

Ultra-secured methods of banking services have been introduced to the customer, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. Consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 38
3885 Tax Evasion with Mobility between the Regular and Irregular Sectors

Authors: Xavier Ruiz Del Portal

Abstract:

This paper incorporates mobility between the legal and black economies into a model of tax evasion with endogenous labor supply in which underreporting is possible in one sector but impossible in the other. We have found that the results of the effects along the extensive margin (number of evaders) become more robust and conclusive than those along the intensive margin (hours of illegal work) usually considered by the literature. In particular, it is shown that the following policies reduce the number of evaders: (a) larger and more progressive evasion penalties; (b) higher detection probabilities; (c) an increase in the legal sector wage rate; (d) a decrease in the moonlighting wage rate; (e) higher costs for creating opportunities to evade; (f) lower opportunities to evade, and (g) greater psychological costs of tax evasion. When tax concealment and illegal work also are taken into account, the effects do not vary significantly under the assumptions in Cowell (1985), except for the fact that policies (a) and (b) only hold as regards low- and middle-income groups and policies (e) and (f) as regards high-income groups.

Keywords: income taxation, tax evasion, extensive margin responses, the penalty system

Procedia PDF Downloads 150
3884 Assessment of Pastoralist-Crop Farmers Conflict and Food Security of Farming Households in Kwara State, Nigeria

Authors: S. A. Salau, I. F. Ayanda, I. Afe, M. O. Adesina, N. B. Nofiu

Abstract:

Food insecurity is still a critical challenge among rural and urban households in Nigeria. The country’s food insecurity situation became more pronounced due to frequent conflict between pastoralist and crop farmers. Thus, this study assesses pastoralist-crop farmers’ conflict and food security of farming households in Kwara state, Nigeria. The specific objectives are to measure the food security status of the respondents, quantify pastoralist- crop farmers’ conflict, determine the effect of pastoralist- crop farmers conflict on food security and describe the effective coping strategies adopted by the respondents to reduce the effect of food insecurity. A combination of purposive and simple random sampling techniques will be used to select 250 farming households for the study. The analytical tools include descriptive statistics, Likert-scale, logistic regression, and food security index. Using the food security index approach, the percentage of households that were food secure and insecure will be known. Pastoralist- crop farmers’ conflict will be measured empirically by quantifying loses due to the conflict. The logistic regression will indicate if pastoralist- crop farmers’ conflict is a critical determinant of food security among farming households in the study area. The coping strategies employed by the respondents in cushioning the effects of food insecurity will also be revealed. Empirical studies on the effect of pastoralist- crop farmers’ conflict on food security are rare in the literature. This study will quantify conflict and reveal the direction as well as the extent of the relationship between conflict and food security. It could contribute to the identification and formulation of strategies for the minimization of conflict among pastoralist and crop farmers in an attempt to reduce food insecurity. Moreover, this study could serve as valuable reference material for future researches and open up new areas for further researches.

Keywords: agriculture, conflict, coping strategies, food security, logistic regression

Procedia PDF Downloads 177
3883 Kebbi State University of Science and Technology, Aliero, Kebbi State

Authors: Ugbajah Maryjane

Abstract:

The study examined the production of grass cutter and the constraints in Anambra state, Nigeria. Specifically, it described socio-economic characteristics of the respondents, determinants of net farm income and constraints to grass cutter production. Multistage and random sampling methods were used to select 50 respondents for this study. Primary data were collected by means of structured questionnaire. Non-parametric and parametric statistical tools including frequency percentage mean ranking counts, cost and returns and returns and multiple regression were deployed for data analysis. Majority 84% produce on small scale, 64 % had formal education 68% had 3-4 years of farming experience hence small scaled production were common. The income (returns) on investment was used as index of profitability, gross margin (#5,972,280), net farm income (#5,327,055.2) net return on investment (2.5) and return on investment 3.1. Net farm income was significantly influence by stock size and years of farming experience. Grass cutter farmers production problem would be ameliorated by the expression of extension education awareness campaigns to discourage unhealthy practices such as indiscriminant bush burning, use of toxic chemicals as baits, and provision of credits to the farmers.

Keywords: socio-economic factors, profitability, awareness, toxic chemicals, credits

Procedia PDF Downloads 404
3882 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 293
3881 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 84
3880 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 385
3879 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 151
3878 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 397
3877 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 111
3876 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 136
3875 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 234
3874 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 663
3873 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 473
3872 Education as a Factor Which Reduces Poverty

Authors: E. V. Fakhrutdinova, Y. S. Kolesnikova, E. A. Karasik, V. M. Zagidullina

Abstract:

Poverty as the social and economic phenomenon exists in any society and represents a many-sided problem. In this sense it is universal and for many centuries serves as a research objects for scientists. Special attention to a problem of poverty in Russia is caused, first of all, by the critical growth of inequality and by scales of expansion of poverty, considerable decrease in the level and quality of life of the population, decrease in availability of education during the period of reforming. The expansion of poverty on the working members of society, youth, which has to provide reproduction of the population is alarming. As poverty is the reason of weakening of national security of the country, degradation of the population, decline in the quality of the human capital, complication of a demographic situation, strengthening of social contradictions in society, so far as the reduction of poverty, so, the increase in production. Poverty: the characteristic of an economic situation of the individual or social group at which they can't satisfy certain minimum requirements necessary for life, preservations of working capacity and reproduction. Poverty became one of the critical factors expelling people from the system of the institutional interactions reducing social space in which their relations were building breaking their social identity. Complication of the problem of poverty in modern society happened due to penetration of the related relations into many spheres of life. It is known that negative consequences of poverty display not only at the personal level of the poor person, but also at the level of interpersonal social interactions, decline in the quality and level of development of the human capital, and also at social and economic system in general. We conducted a research on the influence of education on the change of poverty level of the population. We consider education as a resource for an increase of the income and social mobility. Dependence of the income of the population on the level of education, availability of education (level of education and quality of education) on the level of income of families is found. Differentiation of quality and number of educational services for children depending on the level of the income of families is revealed. Influence of a factor of poverty on the availability of education is also studied. We consider expenses on education as the limiter of access to education. We consider education as a factor of fixation and aggravation of a property inequality. In the solution of problems of poverty the defining condition is the state regulation of social and economic development by means of creation of the effective institutional environment. The state has to develop measures for an increase of availability of various services to all categories of citizens, in particular services of health care and education, especially for poor citizens enters. The special attention regarding an increase of availability of education services has to be paid to creation of system of social elevators.

Keywords: poverty, education, human capital, quality of life

Procedia PDF Downloads 319
3871 Comfort Needs and Energy Practices in Low-Income, Tropical Housing from a Socio-Technical Perspective

Authors: Tania Sharmin

Abstract:

Energy use, overheating and thermal discomfort in low-income tropical housing remains an under-researched area. This research attempts to explore these aspects in the Loving Community, a housing colony created for former leprosy patients and their families in Ahmedabad in India. The living conditions in these households and working practices of the inhabitants in terms of how the building and its internal and external spaces are used, will be explored through interviews and monitoring which will be based on a household survey and a focus group discussion (FGD). The findings from the study will provide a unique and in-depth account of how the relocation of the affected households to the new, flood-resistant and architecturally-designed buildings may have affected the dwellers’ household routines (health and well-being, comfort, satisfaction and working practices) and overall living conditions compared to those living in poorly-designed, existing low-income housings. The new houses were built under an innovative building project supported by De Montfort University Leicester (DMU)’s Square Mile India project. A comparison of newly-built and existing building typologies will reveal how building design can affect people’s use of space and energy use. The findings will be helpful to design healthier, energy efficient and socially acceptable low-income housing in future, thus addressing United Nation’s sustainable development goals on three aspects: 3 (health and well-being), 7 (energy) and 11 (safe, resilient and sustainable human settlements). This will further facilitate knowledge exchange between policy makers, developers, designers and occupants focused on strategies to increase stakeholders’ participation in the design process.

Keywords: thermal comfort, energy use, low-income housing, tropical climate

Procedia PDF Downloads 115
3870 Analysis of Productivity and Poverty Status among Users of Improved Sorghum Varieties in Kano State, Nigeria

Authors: Temitope Adefunsho Olatoye, Julius Olabode Elega

Abstract:

Raising agricultural productivity is an important policy goal for governments and development agencies, and this is central to growth, income distribution, improved food security, and poverty alleviation among practitioners. This study analyzed the productivity and poverty status among users of improved sorghum varieties in Kano State, Nigeria. A multistage sampling technique was adopted in the selection of 131 sorghum farmers who were users of improved sorghum varieties. Data collected were analyzed using both descriptive (frequency distribution and percentage) and inferential (productivity index and FGT model) statistics. The result of the socioeconomic characteristics of the sorghum farmers showed a mean age of 40 years, with about 93.13% of the sorghum farmers being male. Also, as indicated by the result, the majority (82.44%) of the farmers were married, with most of them having qur’anic education with a mean farm size of 3.6 ha, as reported in the study area. Furthermore, the result showed that the mean farming experience of the sorghum farmers in the study area was 19 years, with an average monthly income of about ₦48,794, as reported in the study area. The result of the productivity index showed a ratio of 192,977kg/ha, while the result of poverty status shows that 62.88% were in the non-poor category, 21.21% were poor, and 15.91% were very poor, respectively. The result also showed that the incidence of poverty for sorghum farmers was 16%, indicating that the incidence of poverty was prevalent in the study area. Based on the findings of this study, it was therefore recommended that seed companies should facilitate the spread of improved sorghum varieties as it has an impact on the productivity and poverty status of sorghum farmers in the study area.

Keywords: Foster Greer Thorbecke model, improved sorghum varieties, productivity, poverty status

Procedia PDF Downloads 66
3869 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 145
3868 Key Determinants of Human-Wolf (Canis lupus) Conflict in Shabestar County's Villages of East Azerbaijan Province, Iran

Authors: Nader Habibzadeh

Abstract:

Developing effective and well-targeted conservation strategies is dependent upon fully understanding the complexities of the local situation. We attempted to discern the main likely wolf-human conflict contributing variables in households of Shabestar county’s villages. Data were collected through questions in 53 semi-structured interviews in 36 villages across Shabestar district in summer 2014. The results suggested that people who have reportedly suffered livestock depredation and who have alternative income sources to livestock, are likely to be particularly hostile toward wildlife. With rapid assessment of households using these few key variables we are able to identify likely conflict hotspots and target conflict resolution efforts in those villages. Based on these results, the most important initial strategies for reducing conflict would be reducing the number of livestock killed by wolf, increasing opportunities to generate income only from livestock holdings rather than alternative income sources.

Keywords: human-wildlife conflict, wolf (Canis lupus), Shabestar, Iran

Procedia PDF Downloads 300