Search results for: maintenance of peace and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4409

Search results for: maintenance of peace and security

3809 Development of a Porous Porcelain Frape with Thermochromic Visualization

Authors: Jose Gois

Abstract:

The paper presents the development of a porous porcelain frappe with thermochromic visualization for port wines, having as a partner the Institute of Vinhos do Douro and Porto. This ceramic frappe is intended to promote the cooling and maintenance of the temperature of port wines through porous ceramic materials, consisting of a porcelain composite with sawdust addition, so as to contain, on the one hand, the similar cooling properties of the terracotta and, on the other, the resistance of materials such as porcelain. The application of the thermochromic element makes it possible to see if the wine is at optimal service temperatures, allowing users to drink the wine in the ideal conditions and contributing to more efficient maintenance of the service.

Keywords: design, frappe, porcelain, porous, thermochromic

Procedia PDF Downloads 127
3808 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 134
3807 An Evaluation of Impact of Media on the Electoral Reform Process in Nigeria between 2010–2015

Authors: H. Shola Adeosun, D. Adeoye Odedeji, F. Ajoke Adebiyi

Abstract:

This study examines the impact of media on the electoral process in Nigeria and the roles played by the media in the reform process. Survey research method was adopted as research methodology, and this enables the researcher to use questionnaire, and oral interview to elicit primary data from the respondents was interpreted, analysed and interpreted with statistical tools such as tables, figures, and percentages. The hypothesis formulated were tested with chi-square. The findings revealed that there is significant relationship between the media and electoral reform process in the 2011 and 2015 general elections in Nigeria. The study recommends that electoral committee should implement virile electoral system with the peaceful voting environment. The media should intensify efforts to expose violation of electoral laws; media should play an advocacy role for dialogue and debate on the reform recommendations. The study recommends that media should unite the nation through their reports on peace, national security, national integration and ethnoreligious tolerance and that adequate training should be given to media practitioners on how to report issues relating to elections.

Keywords: evaluation, impact, media, electoral reform process

Procedia PDF Downloads 275
3806 Human LACE1 Functions Pro-Apoptotic and Interacts with Mitochondrial YME1L Protease

Authors: Lukas Stiburek, Jana Cesnekova, Josef Houstek, Jiri Zeman

Abstract:

Cellular function depends on mitochondrial function and integrity that is therefore maintained by several classes of proteins possessing chaperone and/or proteolytic activities. In this work, we focused on characterization of LACE1 (lactation elevated 1) function in mitochondrial protein homeostasis maintenance. LACE1 is the human homologue of yeast mitochondrial Afg1 ATPase, a member of SEC18-NSF, PAS1, CDC48-VCP, TBP family. Yeast Afg1 was shown to be involved in mitochondrial complex IV biogenesis, and based on its similarity with CDC48 (p97/VCP) it was suggested to facilitate extraction of polytopic membrane proteins. Here we show that LACE1, which is a mitochondrial integral membrane protein, exists as part of three complexes of approx. 140, 400 and 500 kDa and is essential for maintenance of fused mitochondrial reticulum and lamellar cristae morphology. Using affinity purification of LACE1-FLAG expressed in LACE1 knockdown background we show that the protein physically interacts with mitochondrial inner membrane protease YME1L. We further show that human LACE1 exhibits significant pro-apoptotic activity and that the protein is required for normal function of the mitochondrial respiratory chain. Thus, our work establishes LACE1 as a novel factor with the crucial role in mitochondrial homeostasis maintenance.

Keywords: LACE1, mitochondria, apoptosis, protease

Procedia PDF Downloads 296
3805 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 102
3804 End to End Monitoring in Oracle Fusion Middleware for Data Verification

Authors: Syed Kashif Ali, Usman Javaid, Abdullah Chohan

Abstract:

In large enterprises multiple departments use different sort of information systems and databases according to their needs. These systems are independent and heterogeneous in nature and sharing information/data between these systems is not an easy task. The usage of middleware technologies have made data sharing between systems very easy. However, monitoring the exchange of data/information for verification purposes between target and source systems is often complex or impossible for maintenance department due to security/access privileges on target and source systems. In this paper, we are intended to present our experience of an end to end data monitoring approach at middle ware level implemented in Oracle BPEL for data verification without any help of monitoring tool.

Keywords: service level agreement, SOA, BPEL, oracle fusion middleware, web service monitoring

Procedia PDF Downloads 462
3803 Multi-Criteria Evolutionary Algorithm to Develop Efficient Schedules for Complex Maintenance Problems

Authors: Sven Tackenberg, Sönke Duckwitz, Andreas Petz, Christopher M. Schlick

Abstract:

This paper introduces an extension to the well-established Resource-Constrained Project Scheduling Problem (RCPSP) to apply it to complex maintenance problems. The problem is to assign technicians to a team which has to process several tasks with multi-level skill requirements during a work shift. Here, several alternative activities for a task allow both, the temporal shift of activities or the reallocation of technicians and tools. As a result, switches from one valid work process variant to another can be considered and may be selected by the developed evolutionary algorithm based on the present skill level of technicians or the available tools. An additional complication of the observed scheduling problem is that the locations of the construction sites are only temporarily accessible during a day. Due to intensive rail traffic, the available time slots for maintenance and repair works are extremely short and are often distributed throughout the day. To identify efficient working periods, a first concept of a Bayesian network is introduced and is integrated into the extended RCPSP with pre-emptive and non-pre-emptive tasks. Thereby, the Bayesian network is used to calculate the probability of a maintenance task to be processed during a specific period of the shift. Focusing on the domain of maintenance of the railway infrastructure in metropolitan areas as the most unproductive implementation process at construction site, the paper illustrates how the extended RCPSP can be applied for maintenance planning support. A multi-criteria evolutionary algorithm with a problem representation is introduced which is capable of revising technician-task allocations, whereas the duration of the task may be stochastic. The approach uses a novel activity list representation to ensure easily describable and modifiable elements which can be converted into detailed shift schedules. Thereby, the main objective is to develop a shift plan which maximizes the utilization of each technician due to a minimization of the waiting times caused by rail traffic. The results of the already implemented core algorithm illustrate a fast convergence towards an optimal team composition for a shift, an efficient sequence of tasks and a high probability of the subsequent implementation due to the stochastic durations of the tasks. In the paper, the algorithm for the extended RCPSP is analyzed in experimental evaluation using real-world example problems with various size, resource complexity, tightness and so forth.

Keywords: maintenance management, scheduling, resource constrained project scheduling problem, genetic algorithms

Procedia PDF Downloads 217
3802 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 103
3801 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 458
3800 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 157
3799 The Relationship between Self-Care Behaviour and Quality of Life Among Heart Failure Patients in Jakarta, Indonesia

Authors: Shedy Maharani Nariswari, Prima Agustia Nova, I. Made Kariasa

Abstract:

Background. Heart Failure (HF) is a chronic and progressive condition associated with significant morbidity, mortality, health care expenditures, and a high readmission rate over the years. Self‐care is essential to manage chronic heart failure in the long term, and it is related to better outcomes and can enhance the quality of life. Objective. The aims of this study were to describe the relationship between self-care behavior and quality of life among heart failure patients in East Jakarta, Indonesia. Methods. This study used a correlational-descriptive design with a cross-sectional study, the sampling method used purposive sampling method. Self-care was measured using Self-care Heart Failure Index version 6.2, and quality of life was measured using The Minnesota Living with Heart Failure. Pearson correlation and Spearman-rho correlations are used to analyze the data. Results. We recruited 103 patients with HF in both outpatient and inpatient ward: mean age 59.26 ± 11.643 years, 63.1% male. Patients with higher levels of education were associated with higher self-care maintenance (p= 0.007). The patient's average quality of life is quite high, with a score of 72,07 ± 16,89. There were a significant relationship among self-care maintenance (r=0,305, p=0,001), self-care management (r=0,330, p=0,001), and self-care confidence (r=0,335, p=0,001) towards the quality of life. Most participants have inadequate self-care maintenance, self-care management, and self-care confidence (score < 70), while the score of quality of life is categorized as poor. Conclusion. The self-care behaviors were limited among patients living with HF in Indonesia yet was associated with better quality of life. It is necessary to promote health related to knowledge and adherence to self-care behavior so that it can improve the quality of life of heart failure patients. This study can be used as a reference to promote self-care among patients with heart failure, it can help to enhance their quality of life.

Keywords: heart failure, self-care maintenance, self-care management, self-care confidence, quality of life

Procedia PDF Downloads 89
3798 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 243
3797 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 75
3796 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 377
3795 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 370
3794 The Importance of Right Speech in Buddhism and Its Relevance Today

Authors: Gautam Sharda

Abstract:

The concept of right speech is the third stage of the noble eightfold path as prescribed by the Buddha and followed by millions of practicing Buddhists. The Buddha lays a lot of importance on the notion of right speech (Samma Vacca). In the Angutara Nikaya, the Buddha mentioned what constitutes right speech, which is basically four kinds of abstentions; namely abstaining from false speech, abstaining from slanderous speech, abstaining from harsh or hateful speech and abstaining from idle chatter. The Buddha gives reasons in support of his view as to why abstaining from these four kinds of speeches is favourable not only for maintaining the peace and equanimity within an individual but also within a society. It is a known fact that when we say something harsh or slanderous to others, it eventually affects our individual peace of mind too. We also know about the many examples of hate speeches which have led to senseless cases of violence and which are well documented within our country and the world. Also, indulging in false speech is not a healthy sign for individuals within a group as this kind of a social group which is based on falsities and lies cannot really survive for long and will eventually lead to chaos. Buddha also told us to refrain from idle chatter or gossip as generally we have seen that idle chatter or gossip does more harm than any good to the individual and the society. Hence, if most of us actually inculcate this third stage (namely, right speech) of the noble eightfold path of the Buddha in our daily life, it would be highly beneficial both for the individual and for the harmony of the society.

Keywords: Buddhism, speech, individual, society

Procedia PDF Downloads 248
3793 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 124
3792 The Study about the New Monitoring System of Signal Equipment of Railways Using Radio Communication

Authors: Masahiko Suzuki, Takashi Kato , Masahiro Kobayashi

Abstract:

In our company, the monitoring system for signal equipment has already implemented. So, we can know the state of signal equipment, sitting in the control room or the maintenance center. But this system was installed over 20 years ago, so it cannot stand the needs such as 'more stable operation', 'broadband data transfer', 'easy construction and easy maintenance'. To satisfy these needs, we studied the monitoring system using radio communication as a new method which can realize the operation in the terrible environment along railroads. In these studies, we have developed the terminals and repeaters based on the ZigBee protocol and have implemented the application using two different radio bands simultaneously. At last, we got the good results from the fundamental examinations using the developed equipment.

Keywords: monitoring, radio communication, 2 bands, ZigBee

Procedia PDF Downloads 572
3791 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 56
3790 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 365
3789 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings

Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush

Abstract:

It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.

Keywords: internet of things, building information modeling, facilities management, structural health monitoring

Procedia PDF Downloads 188
3788 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 316
3787 Bituminous Geomembranes: Sustainable Products for Road Construction and Maintenance

Authors: Ines Antunes, Andrea Massari, Concetta Bartucca

Abstract:

Greenhouse gasses (GHG) role in the atmosphere has been well known since the 19th century; however, researchers have begun to relate them to climate changes only in the second half of the following century. From this moment, scientists started to correlate the presence of GHG such as CO₂ with the global warming phenomena. This has raised the awareness not only of those who were experts in this field but also of public opinion, which is becoming more and more sensitive to environmental pollution and sustainability issues. Nowadays the reduction of GHG emissions is one of the principal objectives of EU nations. The target is an 80% reduction of emissions in 2050 and to reach the important goal of carbon neutrality. Road sector is responsible for an important amount of those emissions (about 20%). The most part is due to traffic, but a good contribution is also given directly or indirectly from road construction and maintenance. Raw material choice and reuse of post-consumer plastic rather than a cleverer design of roads have an important contribution to reducing carbon footprint. Bituminous membranes can be successfully used as reinforcement systems in asphalt layers to improve road pavement performance against cracking. Composite materials coupling membranes with grids and/or fabrics should be able to combine improved tensile properties of the reinforcement with stress absorbing and waterproofing effects of membranes. Polyglass, with its brand dedicated to road construction and maintenance called Polystrada, has done more than this. The company's target was not only to focus sustainability on the final application but also to implement a greener mentality from the cradle to the grave. Starting from production, Polyglass has made important improvements finalized to increase efficiency and minimize waste. The installation of a trigeneration plant and the usage of selected production scraps inside the products as well as the reduction of emissions into the environment, are one of the main efforts of the company to reduce impact during final product build-up. Moreover, the benefit given by installing Polystrada products brings a significant improvement in road lifetime. This has an impact not only on the number of maintenance or renewal that needs to be done (build less) but also on traffic density due to works and road deviation in case of operations. During the end of the life of a road, Polystrada products can be 100% recycled and milled with classical systems used without changing the normal maintenance procedures. In this work, all these contributions were quantified in terms of CO₂ emission thanks to an LCA analysis. The data obtained were compared with a classical system or a standard production of a membrane. What it is possible to see is that the usage of Polyglass products for street maintenance and building gives a significant reduction of emissions in case of membrane installation under the road wearing course.

Keywords: CO₂ emission, LCA, maintenance, sustainability

Procedia PDF Downloads 49
3786 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 131
3785 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 339
3784 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 496
3783 Rural Farmers-Herdsmen Conflicts, State Mediation Failure and Prospects of Traditional Institutions’ Intervention in Southwest Nigeria

Authors: Grace Adebo

Abstract:

Rural Farmers-herdsmen conflicts have resulted in a large number of causalities in many parts of Nigeria. Herds of cattle have died, while farmers recorded inestimable losses of their crops and harvests. The overall consequences have impacted negatively on food security across the country. There are divided opinions by scholars, agricultural experts and conflict analysts on the root causes of the conflicts and why traditional institutional interventions are ineffective in resolving the crisis. The study, therefore, aims to investigate the fundamentality of the conflicts’ causes in Southwest Nigeria and the correlates between traditional institutional authorities’ intervention and farmers-herdsmen conflicts in Southwest Nigeria. A structured interview schedule and focus group discussion were employed to elicit information from 180 farmers and 48 herdsmen selected through a multistage sampling procedure from the conflict zones in Southwest Nigeria. Collected data were analyzed using frequency counts, percentages, means and the Relative Importance Index (RII). The study found that climate change effects, farmland encroachment, crop damage, theft, and competition for land and water resources and pollution were the root causes of the violent herders-rural farmer’s clashes. The quest for wealth acquisition by some traditional rulers and some notable individuals in the conflict neighborhoods, occasioned tribal-mix herds possession and, thus undermining local institutional interventions and perverting justice through weak conflict resolution strategies, therefore, fueling further conflicts. Most farmers in the conflict zones have abandoned their farms for fear of death. This coupled with physical, social, economic and psychological consequences have deepened food insecurity and impaired the economic conditions of the herdsmen and the farmers. Currently, there are no mutually established mediation mechanisms as most states are opposed to the enactment of grazing laws to protect territorial encroachments of lands and subsequent multiplication of the herdsmen. It is suggested that government and Non-Governmental Organisation (NGOs) should encourage a functional stakeholder's forum for sustainable conflict resolution and establish a compensation scheme for losses incurred while extension agents are equipped with knowledge on conflict management strategies for peace attainment with the envisioned goal of achieving sustainable livelihoods and food security in Southwest Nigeria.

Keywords: conflict resolution, food security, herdsmen-farmers conflict, sustainable livelihoods, traditional institutions

Procedia PDF Downloads 99
3782 The Relationship of Weight Regain with Biochemical and Psychological Factors in Non Postmenopausal Women

Authors: Farzad Shidfar, Najmeh Rostami, Ziaodin Mazhari, Fatemeh Hosseini Baharanchi

Abstract:

Background and Aim: The rate of failure to maintain a reduced weight has been increased. By definition, people who regain about one-third to two-thirds of their lost weight after one year from the end of the dietary treatment and return all the lost weight after 5 years it is called weight regain. This study was performed to find the causes of weight regain and its relationship with biochemical and psychological factors. Materials and Methods: This cross-sectional study was performed by reviewing the files of people who followed the dietary treatment in 1397-1398.seventy-three persons was in the weight regain group, and seventy-three people were in the weight maintenance group. Psychological factors such as depression, anxiety, quality of life, physical activity, and dietary frequency were assessed through a questionnaire, and biochemical factors such as serum insulin and fasting blood sugar were measured. The mean basal energy in the weight regain group was significantly higher than the weight maintenance group (p = 0.004). There was no significant difference between the two groups in terms of food intake and inflammatory index of food. There was no significant difference between the two groups in terms of food intake and inflammatory index of food. Mean serum insulin concentration (p = 0.023), mean fasting blood sugar (p = 0.04) and insulin resistance (p = 0.013) in the weight regain group were higher than the weight maintenance group. The weight maintenance group showed higher insulin sensitivity than the weight regain group (p = 0.005). There was no significant difference between the two groups in terms of psychological indicators. Conclusion: The only body mass index after one year from the end of the treatment period, insulin sensitivity, serum insulin concentration, fasting blood sugar, insulin resistance, selenium intake, and basal energy expenditure Specific and significant with weight regain. However, the significance of insulin resistance, basal energy expenditure, and body mass index after one year from the end of the treatment period was higher than other variables in the weight regain group.

Keywords: body weight maintenance, weight regain, insulin resistance, insulin sensitivity

Procedia PDF Downloads 98
3781 Risk Based Maintenance Planning for Loading Equipment in Underground Hard Rock Mine: Case Study

Authors: Sidharth Talan, Devendra Kumar Yadav, Yuvraj Singh Rajput, Subhajit Bhattacharjee

Abstract:

Mining industry is known for its appetite to spend sizeable capital on mine equipment. However, in the current scenario, the mining industry is challenged by daunting factors of non-uniform geological conditions, uneven ore grade, uncontrollable and volatile mineral commodity prices and the ever increasing quest to optimize the capital and operational costs. Thus, the role of equipment reliability and maintenance planning inherits a significant role in augmenting the equipment availability for the operation and in turn boosting the mine productivity. This paper presents the Risk Based Maintenance (RBM) planning conducted on mine loading equipment namely Load Haul Dumpers (LHDs) at Vedanta Resources Ltd subsidiary Hindustan Zinc Limited operated Sindesar Khurd Mines, an underground zinc and lead mine situated in Dariba, Rajasthan, India. The mining equipment at the location is maintained by the Original Equipment Manufacturers (OEMs) namely Sandvik and Atlas Copco, who carry out the maintenance and inspection operations for the equipment. Based on the downtime data extracted for the equipment fleet over the period of 6 months spanning from 1st January 2017 until 30th June 2017, it was revealed that significant contribution of three downtime issues related to namely Engine, Hydraulics, and Transmission to be common among all the loading equipment fleet and substantiated by Pareto Analysis. Further scrutiny through Bubble Matrix Analysis of the given factors revealed the major influence of selective factors namely Overheating, No Load Taken (NTL) issues, Gear Changing issues and Hose Puncture and leakage issues. Utilizing the equipment wise analysis of all the downtime factors obtained, spares consumed, and the alarm logs extracted from the machines, technical design changes in the equipment and pre shift critical alarms checklist were proposed for the equipment maintenance. The given analysis is beneficial to allow OEMs or mine management to focus on the critical issues hampering the reliability of mine equipment and design necessary maintenance strategies to mitigate them.

Keywords: bubble matrix analysis, LHDs, OEMs, Pareto chart analysis, spares consumption matrix, critical alarms checklist

Procedia PDF Downloads 134
3780 Manipulative Figurative Linguistic Violence of Contemporary National Anthems: A Socio-Cognitive Critical Discourse Analysis

Authors: Samson Olasunkanmi Oluga, Teh Chee Send, Gerard Sagaya Raj Rajo

Abstract:

It is ironical that the national anthems of many nations that are in the forefront of the global condemnation of violence of all forms have portions or expressions that propagate various forms of linguistic violence which advocate attacking opponents, going to war, shedding blood and sacrificing lives. These diametrically contradict contemporary yearnings for global tranquility and the ideals of the United Nations established for the maintenance of international peace and harmony aimed at making the world a safe haven for all and sundry. The linguistic violence of many national anthems is manipulatively constructed /presented via the instrumentality of the figurative or rhetorical language. This helps to linguistically embellish the violent ideas communicated and makes them sound somehow better or logical to the target audience with the intention of cognitively manipulating them to accept or rationalize such violent ideas. This paper, therefore, presents the outcome of a linguistic exploration/examination of national anthems which reveals elements or cases manipulative figurative linguistic violence in the anthems of twenty-one (21) nations. The paper details a Socio-Cognitive Critical Discourse Analysis of the manipulative figures of comparison, contrast, indirectness, association and sound used to convey the linguistic violence of the identified national anthems. Finally, the paper advocates the need for linguistic overhaul of affected anthems so that the language of anthems which epitomize nations can be pacific and in tandem with contemporary global trends.

Keywords: national anthems, linguistic violence, figurative language, cognitive, manipulation, CDA

Procedia PDF Downloads 314