Search results for: internal security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4954

Search results for: internal security

4564 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 126
4563 China and the Middle East in the 21st Century: From Political Mediation to Economic Expansionism

Authors: Ali Asghar Sotoudeh

Abstract:

Mediation Diplomacy has emerged as one of the main pillars of China's foreign policy goals and practices, and Beijing has established itself as a peacekeeping force in regional conflicts and crises such as Afghanistan, Syria, Sudan, Yemen, and the Arab-Israeli peace process. China is deepening and intensifying its diplomatic interventions in the Middle East and trying to shape the security and political developments in the Middle East. On the other hand, economically, China has become one of the most important trading partners with Middle Eastern governments. China is also seeking to expand its foreign policy and economic interests in the Middle East through the New Silk Road initiative and has signed cooperation agreements with 17 Arab countries. In this regard, due to the importance of the subject, this research focuses on answering this question; what is the basis of China's political mediation and economic expansionism in the Middle East? In parallel with this question, this study follows the hypothesis that the mediating role of peace is a legitimate way for China to intervene in Middle East political crises, Without causing China to deviate from its traditional guiding principles based on non-interference in the internal affairs of other actors in the international system. This policy also promotes the security of economic interests and increases the country's political influence in the Middle East. The research method is descriptive-analytical based on the qualitative method, and the data collection method is library and internet resources.

Keywords: China, middle east, political mediation, economic expansionism

Procedia PDF Downloads 122
4562 Jitter Based Reconstruction of Transmission Line Pulse Using On-Chip Sensor

Authors: Bhuvnesh Narayanan, Bernhard Weiss, Tvrtko Mandic, Adrijan Baric

Abstract:

This paper discusses a method to reconstruct internal high-frequency signals through subsampling techniques in an IC using an on-chip sensor. Though there are existing methods to internally probe and reconstruct high frequency signals through subsampling techniques; these methods have been applicable mainly for synchronized systems. This paper demonstrates a method for making such non-intrusive on-chip reconstructions possible also in non-synchronized systems. The TLP pulse is used to demonstrate the experimental validation of the concept. The on-chip sensor measures the voltage in an internal node. The jitter in the input pulse causes a varying pulse delay with respect to the on-chip sampling command. By measuring this pulse delay and by correlating it with the measured on-chip voltage, time domain waveforms can be reconstructed, and the influence of the pulse on the internal nodes can be better understood.

Keywords: on-chip sensor, jitter, transmission line pulse, subsampling

Procedia PDF Downloads 121
4561 Causal-Explanatory Model of Academic Performance in Social Anxious Adolescents

Authors: Beatriz Delgado

Abstract:

Although social anxiety is one of the most prevalent disorders in adolescents and causes considerable difficulties and social distress in those with the disorder, to date very few studies have explored the impact of social anxiety on academic adjustment in student populations. The aim of this study was analyze the effect of social anxiety on school functioning in Secondary Education. Specifically, we examined the relationship between social anxiety and self-concept, academic goals, causal attributions, intellectual aptitudes, and learning strategies, personality traits, and academic performance, with the purpose of creating a causal-explanatory model of academic performance. The sample consisted of 2,022 students in the seven to ten grades of Compulsory Secondary Education in Spain (M = 13.18; SD = 1.35; 51.1% boys). We found that: (a) social anxiety has a direct positive effect on internal attributional style, and a direct negative effect on self-concept. Social anxiety also has an indirect negative effect on internal causal attributions; (b) prior performance (first academic trimester) exerts a direct positive effect on intelligence, achievement goals, academic self-concept, and final academic performance (third academic trimester), and a direct negative effect on internal causal attributions. It also has an indirect positive effect on causal attributions (internal and external), learning goals, achievement goals, and study strategies; (c) intelligence has a direct positive effect on learning goals and academic performance (third academic trimester); (d) academic self-concept has a direct positive effect on internal and external attributional style. Also, has an indirect effect on learning goals, achievement goals, and learning strategies; (e) internal attributional style has a direct positive effect on learning strategies and learning goals. Has a positive but indirect effect on achievement goals and learning strategies; (f) external attributional style has a direct negative effect on learning strategies and learning goals and a direct positive effect on internal causal attributions; (g) learning goals have direct positive effect on learning strategies and achievement goals. The structural equation model fit the data well (CFI = .91; RMSEA = .04), explaining 93.8% of the variance in academic performance. Finally, we emphasize that the new causal-explanatory model proposed in the present study represents a significant contribution in that it includes social anxiety as an explanatory variable of cognitive-motivational constructs.

Keywords: academic performance, adolescence, cognitive-motivational variables, social anxiety

Procedia PDF Downloads 308
4560 Linking Remittances and Household Level Development in India: An Analysis of NSSO 64th Round Data

Authors: Rakesh Mishra, Mukunda Upadhyay, Rajni Singh

Abstract:

This paper attempts to link remittances sent by internal as well as international out-migrants and its domestic preferences of usage in three different dimension of Household level development in India and its states. Investment of remittances in these sectors reveals for mixed choices of preferential among the states from where people have out-migrated. The multivariate analysis implies that among all three indicators of human development, health (Investment in Food and Health) is the one that attracts the major investment followed by capital formation and least on Education. Usage of the remittances has been found to be varying across all the states in India as far as usage in health, capital formation and education are concerned. Orissa, Nagaland, Madhya Pradesh, Jharkhand, Gujarat, D & H Haweli are some of the states and union territory that contributes highest of its international remittances on health, while most of the usage of the internal remittances has second or third preferences of investment on the health except for Uttar Pradesh, D & H Haweli, Arunachal Pradesh and A & N Is. This paper tries to access usage of international remittances as well as internal remittances on the flow of remittances at the micro level and its implications across three basic determinants of Human Development that is Health, Capital formation and Education coupled with the preferences of usage in presence of Several Socio economic and Demographic variable.

Keywords: multivariate analysis, household development, remittances, internal and international migration

Procedia PDF Downloads 429
4559 Identifying Children at Risk for Specific Language Impairment Using a Wordless Picture Narrative: A Study on Hindi, an Indian Language

Authors: Yozna Gurung

Abstract:

This paper presents preliminary findings from an on-going study on the use of Internal State Terms (IST) in the production of narratives of Hindi-English bilinguals in an attempt to identify children at risk for Specific Language Impairment. Narratives were examined for macrostructure (story structure and story complexity) and internal state terms or mental state terms (IST/MST). 31 students generated stories based on six pictures that were matched for content and story structure in L1 (Hindi) and L2 (English) using a wordless picture narrative. From 30 sample population, 2 students are at risk of Specific Language Impairment, according to this study i.e 6.45%. They showed least development in story grammar as well as IST in both their languages.

Keywords: internal state terms, macrostructure, specific language impairment, wordless picture narrative

Procedia PDF Downloads 208
4558 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 91
4557 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 97
4556 Seasonal Variability of M₂ Internal Tides Energetics in the Western Bay of Bengal

Authors: A. D. Rao, Sachiko Mohanty

Abstract:

The Internal Waves (IWs) are generated by the flow of barotropic tide over the rapidly varying and steep topographic features like continental shelf slope, subsurface ridges, and the seamounts, etc. The IWs of the tidal frequency are generally known as internal tides. These waves have a significant influence on the vertical density and hence causes mixing in the region. Such waves are also important in submarine acoustics, underwater navigation, offshore structures, ocean mixing and biogeochemical processes, etc. over the shelf-slope region. The seasonal variability of internal tides in the Bay of Bengal with special emphasis on its energetics is examined by using three-dimensional MITgcm model. The numerical simulations are performed for different periods covering August-September, 2013; November-December, 2013 and March-April, 2014 representing monsoon, post-monsoon and pre-monsoon seasons respectively during which high temporal resolution in-situ data sets are available. The model is initially validated through the spectral estimates of density and the baroclinic velocities. From the estimates, it is inferred that the internal tides associated with semi-diurnal frequency are more dominant in both observations and model simulations for November-December and March-April. However, in August, the estimate is found to be maximum near-inertial frequency at all the available depths. The observed vertical structure of the baroclinic velocities and its magnitude are found to be well captured by the model. EOF analysis is performed to decompose the zonal and meridional baroclinic tidal currents into different vertical modes. The analysis suggests that about 70-80% of the total variance comes from Mode-1 semi-diurnal internal tide in both observations as well as in the model simulations. The first three modes are sufficient to describe most of the variability for semidiurnal internal tides, as they represent 90-95% of the total variance for all the seasons. The phase speed, group speed, and wavelength are found to be maximum for post-monsoon season compared to other two seasons. The model simulation suggests that the internal tide is generated all along the shelf-slope regions and propagate away from the generation sites in all the months. The model simulated energy dissipation rate infers that its maximum occurs at the generation sites and hence the local mixing due to internal tide is maximum at these sites. The spatial distribution of available potential energy is found to be maximum in November (20kg/m²) in northern BoB and minimum in August (14kg/m²). The detailed energy budget calculation are made for all the seasons and results are analysed.

Keywords: available potential energy, baroclinic energy flux, internal tides, Bay of Bengal

Procedia PDF Downloads 147
4555 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 452
4554 Determine the Effectiveness of Group Therapy with Reality Therapy Approach to Reduce Symptoms of Anxiety, Increase Self-esteem, and Internal Control in Infertile Women

Authors: Fatemeh Alsadat Borhani, Hassan Heydari, Mansour Abdi

Abstract:

The purpose of this study to determine the effectiveness of group therapy with approach reality therapy in reducing symptoms of anxiety and increased self- esteem and internal control of infertile women. The population of this study is all infertile women in Qom city in 2012 that with the use of purposeful sampling, 32 individuals were selected as sample. 16 individuals of infertile women in the control group and 16 infertile women in the experimental group is replaced. The research design was of type quasi-experimental with design pretest-posttest with control group. Thus, infertile women were randomly appointed in the experimental and control groups. Also, in this study data through normalized questionnaires, the Beck Anxiety scale, Rotter's Locus of control inventory, Cooper Smith self-esteem inventory was collected. For analysis of data, descriptive statistics, mean, standard deviation and inferential statistics, one way analysis of covariance model with SPSS version 20 software was used. The findings indicated that intervention of the group therapy with approach reality therapy in experimental group reduced symptoms of anxiety and mutually increased self-esteem and internal control in infertile women of experimental group.

Keywords: reality therapy, infertile women, anxiety, self esteem, internal control

Procedia PDF Downloads 554
4553 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 151
4552 Single Ended Primary Inductance Converter with Internal Model Controller

Authors: Fatih Suleyman Taskincan, Ahmet Karaarslan

Abstract:

In this article, the study and analysis of Single Ended Primary Inductance Converter (SEPIC) are presented for battery charging applications that will be used in military applications. The usage of this kind of converters come from its advantage of non-reverse polarity at outputs. As capacitors charge and discharge through inductance, peak current does not occur on capacitors. Therefore, the efficiency will be high compared to buck-boost converters. In this study, the converter (SEPIC) is designed to be operated with Internal Model Controller (IMC). The traditional controllers like Proportional Integral Controller are not preferred as its linearity behavior. Hence IMC is designed for this converter. This controller is a model-based control and provides more robustness and better set point monitoring. Moreover, it can be used for an unstable process where the conventional controller cannot handle the dynamic operation. Matlab/Simulink environment is used to simulate the converter and its controller, then, the results are shown and discussed.

Keywords: DC/DC converter, single ended primary inductance converter, SEPIC, internal model controller, IMC, switched mode power supply

Procedia PDF Downloads 603
4551 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 237
4550 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 65
4549 Origin Variability of Superior Vesical Artery

Authors: Waseem Al-Talalwah

Abstract:

The superior vesical artery usually arises directly from the anterior division of the internal iliac artery. It may arise from the umbilical artery as three or four branches to supply the upper and middle parts of bladder. Current study focuses on the different origins of the superior vesical artery to provide a sufficient data for surgeons to disease iatrogenic fault. The superior vesical artery arises directly from the anterior division of the internal iliac artery in 24.5% whereas it arises indirectly as from umbilical artery in 83.7%. Further, it may arise from any branch of the anterior division as from the utrine and obturator arteries in 6.1% and in 6.3% respectively. It also shares the origin of the internal pudendal and inferior glutyeal artery as it arises from the gluteopudendal trunk in 4.1%. The superior vesical artery arises as a single, double, triple and quadruple in 69.4%, 20.4%, 8.2% and 2% respectively. In case of cystectomy for bladder cancer, surgeons have to be aware of the origin variability of superior vesical artery to prevent post-surgical complication such as intra-pelvic bleeding. Also, the as intra-pelvic bleeding has to be expected in case of hysterectomy therefore a great caution of the vesical branches arising from uterine artery has to be considered. In case of aneurysm resection of inferior gluteal artery arising from the gluteopudendal trunk, the surgeons have to be careful of the vascular supply of urinary bladder coming from above and below this common trunk as from superior and inferior vesical arteries respectively. Therefore, present study increases the awareness of clinical significance of superior vesical artery origin for surgeons to minimise the iatroginc errors.

Keywords: superior vesical artery, anterior division, internal iliac, internal pudendal, inferior glutyeal, intra-pelvic bleeding, hysterectomy, cystectomy

Procedia PDF Downloads 369
4548 Quality of Care of Medical Male Circumcisions: A Non-Negotiable for Right to Care

Authors: Nelson Igaba, C. Onaga, S. Hlongwane

Abstract:

Background: Medical Male Circumcision (MMC) is part of a comprehensive HIV prevention strategy. The quality of MMC done at Right To Care (RtC) sites is maintained by Continuous Quality Improvement (CQI) based on findings of assessments by internal and independent external assessors who evaluate such parameters as the quality of the surgical procedure, infection control, etc. There are 12 RtC MMC teams in Mpumalanga, two of which are headed by Medical Officers and 10 by Clinical Associates (Clin A). Objectives: To compare the quality (i) of care rendered at doctor headed sites (DHS) versus Clin A headed sites (CHS); (ii) of CQI assessments (external versus internal). Methodology: A retrospective review of data from RightMax™ (a novel RtC data management system) and CQI reports (external and internal) was done. CQI assessment scores of October 2015 and October 2016 were taken as the baseline and latest respectively. Four sites with 745-810 circumcisions per annum were purposively selected; the two DHS (group A) and two CHS (group B). Statistical analyses were conducted using R (2017 version). Results: There were no significant difference in latest CQI scores between the two groups (DHS and CHS) (Anova, F = 1.97, df = 1, P = 0.165); between internal and external CQI assessment scores (Anova, F = 2.251, df = 1, P = 0.139) or among the individual sites (Anova, F = 1.095, df = 2, P = 0.341). Of the total of 16 adverse events reported by the four sites in the 12 months reviewed (all were infections), there was no statistical evidence that the documented severity of the infection was different for DHS and CHS (Fisher’s exact test, p-value = 0.269). Conclusion: At RtC VMMC sites in Mpumalanga, internal and external/independent CQI assessments are comparable, and quality of care of VMMC is standardized with the performance of well-supervised clinical associates comparing well with those of medical officers.

Keywords: adverse events, Right to Care, male medical circumcision, continuous quality improvement

Procedia PDF Downloads 150
4547 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 364
4546 The Internal Migration in Jiangxi Province, China after the Migrating Decision

Authors: Gourida Siham

Abstract:

Chinese society has witnessed a continuing trend of nationwide rural to urban migration since the 1970's. Before that age, under restricted hukou systems, peasants were kept still and fixed in the farm land. The year 1978 and later years saw the control of migration in China was relaxed gradually, freeing peasants to start their own businesses and reach out to work also in urban areas. Since then the “floating population” (migrants without local hukou) took great momentum and drew great attention from both the media and academia. The scale of such internal migration is enormous –the floating population has reached to a number of 79 million in 2000, and as of 2010, the number of migrant workers from rural China amounts to over 221 million and according to the annual survey results projections by National Bureau of Statistics; the total migrant workers in china in 2012 amounted to 262.61 million, which refers to an increase of 9.83 million compared with the previous year with increase percentage by 3.9%. Using China’s Jiangxi Province as a case, this paper examines patterns of internal migration as a response of emigrations in the context of high emigration communities. Our findings suggest that emigration of individuals initially deterred both inter-provincial and intra- provincial migration of other family members, and yet, overtime they had an increasing propensity to migrate internally at both scales.

Keywords: internal migration, jiangxi, nanchang, remittances

Procedia PDF Downloads 380
4545 Experimental and Comparative Study of Composite Thin Cylinder Subjected to Internal Pressure

Authors: Hakim S. Sultan Aljibori

Abstract:

An experimental procedure is developed to study the performance of composite thin wall cylinders subjected to internal pressure loading for investigations of stress distribution through the composite cylinders wall. Three types of fibers were used in this study are; woven roving glass fiber/epoxy, hybrid fiber/epoxy, and Kevlar fiber/epoxy composite specimens were fabricated and tested. All of these specimens subjected to uniformed pressure load using the hydraulic pump. Axial stress is identified, and values were found after collecting all the results. Comparison between the deferent types of specimens was done. Thus, the present investigation concludes the efficient and effective composite cylinder experimentally and provides a considerable advantage for using woven roving fibers in pressure vessels applications.

Keywords: stress distribution, composite material, internal pressure, glass fiber, hybrid fiber

Procedia PDF Downloads 133
4544 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 119
4543 An Examination of Internal Control System, Executive Duality and Audit Alarm Committee of Listed Nigerian Companies

Authors: Mansur Lubabah Kwanbo

Abstract:

Existing literatures have demonstrated the importance of executive duality (ED) and audit committee (AC) in the financial growth of companies. To some extent this points to corporate governance mechanism aiming at addressing makers and implementers of company policies to be centered on promoting only company objectives. However, furthering organizational objectives needs an adequate structure of control to realize that. Recent development in the various industries in Nigeria have indicated the internal control system (ICS)has not been able to adequately address most of the activities that results in ills of sustaining growth for these industries. It is from this premise the study has as one of its objective to determine the extent to which ICS significantly relates to ED and AC in listed Nigerian corporation. Data were sourced from 308 financial statements and accounts of the corporations that made the sample of the study. Logistic regression aided the test of the hypothesis formulated for the study. Findings revealed a significant relationship between the study variables. The study concludes that the internal control system (ICS) is effective despite the bifurcation of executive duality (ED) and the presence of the Audit Committee (AC) to the extent of preventing ills that encourage lack of sustainability of company’s growth. Sustaining legitimate policies that translate into huge earnings, and create value to stake holders should be pursued.

Keywords: audit committee (AC), executive duality (ED), internal control system (ICS), Nigeria

Procedia PDF Downloads 270
4542 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 93
4541 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 351
4540 Structural Equation Modelling Based Approach to Integrate Customers and Suppliers with Internal Practices for Lean Manufacturing Implementation in the Indian Context

Authors: Protik Basu, Indranil Ghosh, Pranab K. Dan

Abstract:

Lean management is an integrated socio-technical system to bring about a competitive state in an organization. The purpose of this paper is to explore and integrate the role of customers and suppliers with the internal practices of the Indian manufacturing industries towards successful implementation of lean manufacturing (LM). An extensive literature survey is carried out. An attempt is made to build an exhaustive list of all the input manifests related to customers, suppliers and internal practices necessary for LM implementation, coupled with a similar exhaustive list of the benefits accrued from its successful implementation. A structural model is thus conceptualized, which is empirically validated based on the data from the Indian manufacturing sector. With the current impetus on developing the industrial sector, the Government of India recently introduced the Lean Manufacturing Competitiveness Scheme that aims to increase competitiveness with the help of lean concepts. There is a huge scope to enrich the Indian industries with the lean benefits, the implementation status being quite low. Hardly any survey-based empirical study in India has been found to integrate customers and suppliers with the internal processes towards successful LM implementation. This empirical research is thus carried out in the Indian manufacturing industries. The basic steps of the research methodology followed in this research are the identification of input and output manifest variables and latent constructs, model proposition and hypotheses development, development of survey instrument, sampling and data collection and model validation (exploratory factor analysis, confirmatory factor analysis, and structural equation modeling). The analysis reveals six key input constructs and three output constructs, indicating that these constructs should act in unison to maximize the benefits of implementing lean. The structural model presented in this paper may be treated as a guide to integrating customers and suppliers with internal practices to successfully implement lean. Integrating customers and suppliers with internal practices into a unified, coherent manufacturing system will lead to an optimum utilization of resources. This work is one of the very first researches to have a survey-based empirical analysis of the role of customers, suppliers and internal practices of the Indian manufacturing sector towards an effective lean implementation.

Keywords: customer management, internal manufacturing practices, lean benefits, lean implementation, lean manufacturing, structural model, supplier management

Procedia PDF Downloads 156
4539 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 307
4538 A Novel Integration of Berth Allocation, Quay Cranes and Trucks Scheduling Problems in Container Terminals

Authors: M. Moharami Gargari, S. Javdani Zamani, A. Mohammadnejad, S. Abuali

Abstract:

As maritime container transport is developing fast, the need arises for efficient operations at container terminals. One of the most important determinants of container handling efficiency is the productivity of quay cranes and internal transportation vehicles, which are responsible transporting of containers for unloading and loading operations for container vessels. For this reason, this paper presents an integrated mathematical model formulation for discrete berths with quay cranes and internal transportations vehicles. The problems have received increasing attention in the literature and the present paper deals with the integration of these interrelated problems. A new mixed integer linear formulation is developed for the Berth Allocation Problem (BAP), Quay Crane Assignment and Scheduling Problem (QCASP) and Internal Transportation Scheduling (ITS), which accounts for cranes and trucks positioning conditions.

Keywords: discrete berths, container terminal, truck scheduling, dynamic vessel arrival

Procedia PDF Downloads 378
4537 Influence of Internal Topologies on Components Produced by Selective Laser Melting: Numerical Analysis

Authors: C. Malça, P. Gonçalves, N. Alves, A. Mateus

Abstract:

Regardless of the manufacturing process used, subtractive or additive, material, purpose and application, produced components are conventionally solid mass with more or less complex shape depending on the production technology selected. Aspects such as reducing the weight of components, associated with the low volume of material required and the almost non-existent material waste, speed and flexibility of production and, primarily, a high mechanical strength combined with high structural performance, are competitive advantages in any industrial sector, from automotive, molds, aviation, aerospace, construction, pharmaceuticals, medicine and more recently in human tissue engineering. Such features, properties and functionalities are attained in metal components produced using the additive technique of Rapid Prototyping from metal powders commonly known as Selective Laser Melting (SLM), with optimized internal topologies and varying densities. In order to produce components with high strength and high structural and functional performance, regardless of the type of application, three different internal topologies were developed and analyzed using numerical computational tools. The developed topologies were numerically submitted to mechanical compression and four point bending testing. Finite Element Analysis results demonstrate how different internal topologies can contribute to improve mechanical properties, even with a high degree of porosity relatively to fully dense components. Results are very promising not only from the point of view of mechanical resistance, but especially through the achievement of considerable variation in density without loss of structural and functional high performance.

Keywords: additive manufacturing, internal topologies, porosity, rapid prototyping, selective laser melting

Procedia PDF Downloads 311
4536 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 125
4535 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 331