Search results for: national security hazards
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7195

Search results for: national security hazards

6565 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 105
6564 Computer-Based versus Paper-Based Tests: A Comparative Study of Two Types of Indonesian National Examination for Senior High School Students

Authors: Faizal Mansyur

Abstract:

The objective of this research is to find out whether there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based tests. The population of this research is senior high school students in South Sulawesi Province who sat the Indonesian National Examination for 2015/2016 academic year. The samples of this research are 800 students’ scores from 8 schools taken by employing the multistage random sampling technique. The data of this research is a secondary data since it is obtained from the education office for South Sulawesi. In analyzing the collected data, the researcher employed the independent samples T-Test with the help of SPSS v.24 program. The finding of this research reveals that there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based Tests (p < .05). Moreover, students tested by using PBT (Mean = 63.13, SD = 13.63) achieve higher score than those tested by using CBT (Mean = 46.33, SD = 14.68).

Keywords: computer-based test, paper-based test, Indonesian national examination, testing

Procedia PDF Downloads 158
6563 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 86
6562 Evaluating the Possibility of Expanding National Health Insurance Funding From Zakat, Sudan

Authors: Fawzia Mohammed Idris

Abstract:

Zakat is an Islamic procedure for wealth distribution as a social protection mechanism for needy people. This study aimed to assess the possibility to expand the share of fund for national health insurance fund from zakat funds allocated for poor people by measuring the reduction of poverty that result from the investing on direct payment to the needy or by covering them in social health insurance. This study used stata regression as a statistical analysis tool and the finding clarified that there is no significant relationship between the poverty rate as the main indicator and, the number of poor people covered by national health insurance on one hand and the number of benefits poor people from the distribution of zakat fund. This study experienced many difficulties regarding the quality and the consistency of the data. The study suggested that a joint mission between national health insurance fund and zakat chamber to conduct study to assess the efficient use of zakat fund allocated to poor people.

Keywords: health finance, poverty, social health insurance, zakat

Procedia PDF Downloads 133
6561 The Use of AI to Measure Gross National Happiness

Authors: Riona Dighe

Abstract:

This research attempts to identify an alternative approach to the measurement of Gross National Happiness (GNH). It uses artificial intelligence (AI), incorporating natural language processing (NLP) and sentiment analysis to measure GNH. We use ‘off the shelf’ NLP models responsible for the sentiment analysis of a sentence as a building block for this research. We constructed an algorithm using NLP models to derive a sentiment analysis score against sentences. This was then tested against a sample of 20 respondents to derive a sentiment analysis score. The scores generated resembled human responses. By utilising the MLP classifier, decision tree, linear model, and K-nearest neighbors, we were able to obtain a test accuracy of 89.97%, 54.63%, 52.13%, and 47.9%, respectively. This gave us the confidence to use the NLP models against sentences in websites to measure the GNH of a country.

Keywords: artificial intelligence, NLP, sentiment analysis, gross national happiness

Procedia PDF Downloads 93
6560 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics

Authors: Gizem Ertürk, Nursena Dinç

Abstract:

The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.

Keywords: migration, biopolitics, Frontex, security, European union, securitization

Procedia PDF Downloads 129
6559 A Review of the Fundamental Principles of the National Transport Policy and Developmental Implementation Programmes

Authors: Charles Asenime, Asaju Joel, Fagbenro Abiola, Adetoyese Oguntimehin, Agosu Rebecca

Abstract:

This paper examines the fundamental principles of the National Transport Policy (NTP) and determined its role in the execution of transport projects, and the establishment of ministries, departments, and agencies. Data used for the paper are from secondary sources of commissioned reports, studies, internet sources, and government releases. Results of the analysis show that the draft NTP has been used to establish transport schemes, master plans, and transport infrastructure. The paper concludes that though, the national transport Policy is still in a draft form, its production, however, has shaped the transport system in Nigeria and has shown how transport has improved the economy through the efficient utilisation of resources, improved mobility, and lifestyle.

Keywords: principles, draft, system, resources

Procedia PDF Downloads 121
6558 Role of Agriculture Equipment toward Food Security: Case Study of Agriculture Equipment Assistance during President Joko Widodo Era in Indonesia

Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina

Abstract:

Indonesia is an agrarian country endowed by fertile soil, supportive weather, and natural resources which can support agricultural activities. There are commodities which produced by local farmers. Even though Indonesia had commodities, it still imports stocks of staple food. To reduce the dependency on imported staple food, President Joko Widodo wants to generate more locally-produced staple food by giving 69.000 tractors, free seeds, and fertilizers to the local farmers. In Indonesia, the problem revolves around the amount of food production especially rice derived from farmers who cannot afford technologies which can support the agricultural activities. Moreover, they cannot afford seeds and fertilizers which can make the production of commodities more effective and have high quality. Therefore, the paper would like to answer how agriculture equipment assistance during President Joko Widodo era can give significant impact towards food security. The purpose of this paper is to explore the role of agriculture equipment assistance and its impact towards Indonesia’s food security. This paper uses Boserup and Ruthenberg theory of agricultural intensification to link agriculture equipment and intensification of production which in the end will have impact towards food security through case study method. The paper affirms that the role of agricultural equipment assistance toward food security in Indonesia is significant toward Indonesia’s food production and security.

Keywords: agricultural equipment, agricultural intensification, Boserup, Indonesia, Joko Widodo, Ruthenberg

Procedia PDF Downloads 171
6557 Resilience of Infrastructure Networks: Maintenance of Bridges in Mountainous Environments

Authors: Lorenza Abbracciavento, Valerio De Biagi

Abstract:

Infrastructures are key elements to ensure the operational functionality of the transport system. The collapse of a single bridge or, equivalently, a tunnel can leads an entire motorway to be considered completely inaccessible. As a consequence, the paralysis of the communications network determines several important drawbacks for the community. Recent chronicle events have demonstrated that ensuring the functional continuity of the strategic infrastructures during and after a catastrophic event makes a significant difference in terms of life and economical losses. Moreover, it has been observed that RC structures located in mountain environments show a worst state of conservation compared to the same typology and aging structures located in temperate climates. Because of its morphology, in fact, the mountain environment is particularly exposed to severe collapse and deterioration phenomena, generally: natural hazards, e.g. rock falls, and meteorological hazards, e.g. freeze-thaw cycles or heavy snows. For these reasons, deep investigation on the characteristics of these processes becomes of fundamental importance to provide smart and sustainable solutions and make the infrastructure system more resilient. In this paper, the design of a monitoring system in mountainous environments is presented and analyzed in its parts. The method not only takes into account the peculiar climatic conditions, but it is integrated and interacts with the environment surrounding.

Keywords: structural health monitoring, resilience of bridges, mountain infrastructures, infrastructural network, maintenance

Procedia PDF Downloads 58
6556 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 421
6555 The Impact of Adopting Cross Breed Dairy Cows on Households’ Income and Food Security in the Case of Dejen Woreda, Amhara Region, Ethiopia

Authors: Misganaw Chere Siferih

Abstract:

This study assessed the impact of crossbreed dairy cows on household income and food security. The study area is found in Dejen Woreda, East Gojam Zone, and Amhara region of Ethiopia. Random sampling technique was used to obtain a sample of 80 crossbreed dairy cow owners and 176 indigenous dairy cow owners. The study employed food consumption score analytical framework to measure food security status of the household. No Statistical significant mean difference is found between crossbreed owners and indigenous owners. Logistic regression was employed to investigate crossbreed dairy cow adoption determinants , the result indicates that gender, education, labor number, land size cultivated, dairy cooperatives membership, net income and food security status of the household are statistically significant independent variables, which explained the binary dependent variable, crossbreed dairy cow adoption. Propensity score matching (PSM) was employed to analyze the impact of crossbreed dairy cow owners on farmers’ income and food security. The average net income of crossbreed dairy cow owners was found to be significantly higher than indigenous dairy cow owners. Estimates of average treatment effect of the treated (ATT) indicated that crossbreed dairy cow is able to impact households’ net income by 42%, 38.5%, 30.8% and 44.5% higher in kernel, radius, nearest neighborhood and stratification matching algorithms respectively as compared to indigenous dairy cow owners. However, estimates of average treatment of the treated (ATT) suggest that being an owner of crossbreed dairy cow is not able to affect food security significantly. Thus, crossbreed dairy cow enables farmers to increase income but not their food security in the study area. Finally, the study recommended establishing dairy cooperatives and advice farmers to become a member of them, attention to promoting the impact of crossbreed dairy cows and promotion of nutrition focus projects.

Keywords: crossbreed dairy cow, net income, food security, propensity score matching

Procedia PDF Downloads 39
6554 A New Development Pathway And Innovative Solutions Through Food Security System

Authors: Osatuyi Kehinde Micheal

Abstract:

There is much research that has contributed to an improved understanding of the future of food security, especially during the COVID-19 pandemic. A pathway was developed by using a local community kitchen in Muizenberg in western cape province, cape town, south Africa, a case study to map out the future of food security in times of crisis. This kitchen aims to provide nutritious, affordable, plant-based meals to our community. It is also a place of diverse learning, sharing, empowering the volunteers, and growth to support the local economy and future resilience by sustaining our community kitchen for the community. This document contains an overview of the story of the community kitchen on how we create self-sustainability as a new pathway development to sustain the community and reduce Zero hunger in the regional food system. This paper describes the key elements of how we respond to covid-19 pandemic by sharing food parcels and creating 13 soup kitchens across the community to tackle the immediate response to covid-19 pandemic and agricultural systems by growing home food gardening in different homes, also having a consciousness Dry goods store to reduce Zero waste and a local currency as an innovation to reduce food crisis. Insights gained from our article and outreach and their value in how we create adaptation, transformation, and sustainability as a new development pathway to solve any future problem crisis in the food security system in our society.

Keywords: sustainability, food security, community development, adapatation, transformation

Procedia PDF Downloads 66
6553 Attitude of Tertiary Students on Multiculturalism in Indonesia

Authors: Budi Annisa Sidi

Abstract:

Present-day Indonesia maintains a narrative of a culturally plural but unified nation. At the same time, multicultural policies extend different degrees of recognition, accommodation, toleration and even discrimination towards different socio-cultural groups. In conjunction with different ethnographic landscapes across regions in Indonesia, this approach leads to a varied experience and understanding of national identity and multiculturalism among people. As a result, governments seeking to maintain national unity while practicing multiculturalism have to juggle different expectations. This situation is examined through the microcosms of university students using questionnaires followed up by focus group discussions and personal interviews. A comparison between university students across four different provinces in Indonesia (Aceh, Jakarta, West Java and the Moluccas) highlights the influence of one’s surroundings on their perception of multiculturalism. Students in the more heterogeneous areas generally show more acceptance towards diversity compared to students in primarily homogenous areas who have little actual experience in dealing with diversity. Regardless of their environment, students claim to have positive feelings and a strong sense of attachment to Indonesia but hold different ideas of what constitutes an ideal Indonesian national identity.

Keywords: Indonesia, multiculturalism, national identity, nationalism

Procedia PDF Downloads 221
6552 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria

Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu

Abstract:

Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.

Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression

Procedia PDF Downloads 160
6551 Terrorism and National Development: A Critique of Its Aftermath on Educational Attainment

Authors: David Chapola Nggada

Abstract:

Although the concept of terrorism is not a new phenomenon to Nigeria, the protracted terrorist activities experiencing in the north-eastern part of the country since 2009, had left an indelible mark on virtually every aspects of lives whether directly or indirectly, particularly the educational sector. Indeed, since the abduction of over 200 schoolgirls at Chibok in 2014 by the insurgence, education had witnessed a setback as most school remains closed for sometimes. The aftermath of this development on education and its future multiplier effect on national development is a source of concern. Consequently, this paper is designed to examine the consequences of terrorism on educational attainment and national development among the Chibok community of Borno State. The technique employed involves a mixture of both qualitative and quantitative research work on a sample size of 79 secondary school students currently displaced from Chibok, Damboa and Askira-Uba, now residing as internally displaced persons(IDPs) in Biu, Gombe, Maiduguri. A random sample technique is used. Structured and semi-unstructured questionnaire were administered. The result shows that, a significant number of students over these years, lacked access to education and this posed a great danger to national development. Recommendations towards reinvigorating education as a panacea to social, economic cum political vices were articulated. Concerted effort should be made to create confidence in the community.

Keywords: education, effect, terrorism, national, development

Procedia PDF Downloads 250
6550 Understanding the Influence of Cross-National Distances on Tourist Expenditure

Authors: Wei-Ting Hung

Abstract:

Inbound tourist expenditure might not only have influenced by individual tourist characteristics but may also be affected by nationality characteristics. The cross national distance effects on tourist consumption behavior should be incorporated in the analytical framework. Additionally, the often used factor analysis, cluster analysis and regression analysis overlook the hierarchical tourist consumption data structure and may lead to misleading results. The objectives of the present study were twofold. First, we propose a multilevel model that takes individual and cross-national differences into account under a hierarchical framework. Second, we further sought to determine the types of cross-national differences affecting tourist expenditure. Thus, this study incorporates the individual tourist effects and cross national distance effects simultaneously, uses the data of 2010 Annual Survey Report on Visitors’ Expenditure and Trends in Taiwan to investigate the determinants of inbound tourist expenditure. Multilevel analysis was used to investigate the influence of individual tourist effects and cross national distance effects on inbound tourist expenditure. The empirical results show that cross national distance plays a crucial role in tourist consumption behavior. Our findings also indicate age and income have positive influence on tourism expenditure., whereas education and gender do not have significant impact. Regarding macro-level factors, geographic and cultural differences exhibited significant positive relationships on tourism expenditure, while economic differences did not. Based on the above empirical results, it is suggested that tour operators should take tourists’ individual attributes, particularly their income and age, into consideration when arranging tours. In addition, nationality holds sway over tourists’ consumption behavior, of which geographic and cultural differences are the two major factors at play. The empirical results of this study serve as practical suggestions for tourism marketing strategies and policy implications for government policies.

Keywords: cross national distance, inbound tourist, multilevel analysis, tourist expenditure

Procedia PDF Downloads 348
6549 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 117
6548 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 314
6547 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 102
6546 Flood Disaster Prevention and Mitigation in Nigeria Using Geographic Information System

Authors: Dinebari Akpee, Friday Aabe Gaage, Florence Fred Nwaigwu

Abstract:

Natural disasters like flood affect many parts of the world including developing countries like Nigeria. As a result, many human lives are lost, properties damaged and so much money is lost in infrastructure damages. These hazards and losses can be mitigated and reduced by providing reliable spatial information to the generality of the people through about flood risks through flood inundation maps. Flood inundation maps are very crucial for emergency action plans, urban planning, ecological studies and insurance rates. Nigeria experience her worst flood in her entire history this year. Many cities were submerged and completely under water due to torrential rainfall. Poor city planning, lack of effective development control among others contributes to the problem too. Geographic information system (GIS) can be used to visualize the extent of flooding, analyze flood maps to produce flood damaged estimation maps and flood risk maps. In this research, the under listed steps were taken in preparation of flood risk maps for the study area: (1) Digitization of topographic data and preparation of digital elevation model using ArcGIS (2) Flood simulation using hydraulic model and integration and (3) Integration of the first two steps to produce flood risk maps. The results shows that GIS can play crucial role in Flood disaster control and mitigation.

Keywords: flood disaster, risk maps, geographic information system, hazards

Procedia PDF Downloads 211
6545 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 370
6544 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 538
6543 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 645
6542 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 382
6541 Comparison of Two Maintenance Policies for a Two-Unit Series System Considering General Repair

Authors: Seyedvahid Najafi, Viliam Makis

Abstract:

In recent years, maintenance optimization has attracted special attention due to the growth of industrial systems complexity. Maintenance costs are high for many systems, and preventive maintenance is effective when it increases operations' reliability and safety at a reduced cost. The novelty of this research is to consider general repair in the modeling of multi-unit series systems and solve the maintenance problem for such systems using the semi-Markov decision process (SMDP) framework. We propose an opportunistic maintenance policy for a series system composed of two main units. Unit 1, which is more expensive than unit 2, is subjected to condition monitoring, and its deterioration is modeled using a gamma process. Unit 1 hazard rate is estimated by the proportional hazards model (PHM), and two hazard rate control limits are considered as the thresholds of maintenance interventions for unit 1. Maintenance is performed on unit 2, considering an age control limit. The objective is to find the optimal control limits and minimize the long-run expected average cost per unit time. The proposed algorithm is applied to a numerical example to compare the effectiveness of the proposed policy (policy Ⅰ) with policy Ⅱ, which is similar to policy Ⅰ, but instead of general repair, replacement is performed. Results show that policy Ⅰ leads to lower average cost compared with policy Ⅱ. 

Keywords: condition-based maintenance, proportional hazards model, semi-Markov decision process, two-unit series systems

Procedia PDF Downloads 106
6540 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 394
6539 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 253
6538 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 320
6537 A Structural Equation Model of Risk Perception of Rockfall for Revisit Intention

Authors: Ya-Fen Lee, Yun-Yao Chi

Abstract:

The study aims to explore the relationship between risk perceptions of rockfall and revisit intention using a Structural Equation Modelling (SEM) analysis. A total of 573 valid questionnaires are collected from travelers to Taroko National Park, Taiwan. The findings show the majority of travellers have the medium perception of rockfall risk, and are willing to revisit the Taroko National Park. The revisit intention to Taroko National Park is influenced by hazardous preferences, willingness-to-pay, obstruction and attraction. The risk perception has an indirect effect on revisit intention through influencing willingness-to-pay. The study results can be a reference for mitigation the rockfall disaster.

Keywords: risk perception, rockfall, revisit intention, structural equation modelling

Procedia PDF Downloads 414
6536 A Comparative Study of the Proposed Models for the Components of the National Health Information System

Authors: M. Ahmadi, Sh. Damanabi, F. Sadoughi

Abstract:

National Health Information System plays an important role in ensuring timely and reliable access to Health information which is essential for strategic and operational decisions that improve health, quality and effectiveness of health care. In other words, by using the National Health information system you can improve the quality of health data, information and knowledge used to support decision making at all levels and areas of the health sector. Since full identification of the components of this system for better planning and management influential factors of performance seems necessary, therefore, in this study, different attitudes towards components of this system are explored comparatively. Methods: This is a descriptive and comparative kind of study. The society includes printed and electronic documents containing components of the national health information system in three parts: input, process, and output. In this context, search for information using library resources and internet search were conducted and data analysis was expressed using comparative tables and qualitative data. Results: The findings showed that there are three different perspectives presenting the components of national health information system, Lippeveld, Sauerborn, and Bodart Model in 2000, Health Metrics Network (HMN) model from World Health Organization in 2008 and Gattini’s 2009 model. All three models outlined above in the input (resources and structure) require components of management and leadership, planning and design programs, supply of staff, software and hardware facilities, and equipment. In addition, in the ‘process’ section from three models, we pointed up the actions ensuring the quality of health information system and in output section, except Lippeveld Model, two other models consider information products, usage and distribution of information as components of the national health information system. Conclusion: The results showed that all the three models have had a brief discussion about the components of health information in input section. However, Lippeveld model has overlooked the components of national health information in process and output sections. Therefore, it seems that the health measurement model of network has a comprehensive presentation for the components of health system in all three sections-input, process, and output.

Keywords: National Health Information System, components of the NHIS, Lippeveld Model

Procedia PDF Downloads 408