Search results for: pacification and security policy plan
7264 Effect of Irregularities on Seismic Performance of Building
Authors: Snehal Mevada, Darshana Bhatt, Aryan Kalthiya, Neel Parmar, Vishal Baraiya, Dhruvit Bhanderi, Tisha Patel
Abstract:
In multi-storeyed framed buildings, damage occurring from earthquake ground motion generally initiates at locations of structural weaknesses present in the lateral load-resisting frame. In some cases, these weaknesses may be created by discontinuities in stiffness, mass, plan, and torsion. Such discontinuity between storeys is often associated with sudden variations in the vertical geometric irregularities and plan irregularities. Vertical irregularities are structures with a soft storey that can further be broken down into the different types of irregularities as well as their severity for a more refined assessment tool pushover analysis which is one of the methods available for evaluating building against earthquake loads. So, it is very necessary to analyse and understand the seismic performance of the irregular structure in order to reduce the damage which occurs during an earthquake. In this project, a multi-storey (G+4) RCC building with four irregularities (stiffness, mass, plan, torsion) is studied for earthquake loads using the response spectrum method (dynamic analysis) and STADD PRO. All analyses have been done for seismic zone IV and for Medium Soil. In this study effects of different irregularities are analysed based on storey displacement, storey drift, and storey shear.Keywords: comparison of regular and irregular structure, dynamic analysis, mass irregularity, plan irregularity, response spectrum method, stiffness irregularity, seismic performance, torsional irregularity, STAAD PRO
Procedia PDF Downloads 737263 Evaluating Oman's Green Transition: A Dynamic Stochastic General Equilibrium Analysis of Climate Policy Effects
Authors: Mohamed Chakroun
Abstract:
In this paper, we analyze the macroeconomic impacts of Oman’s strategy to transition to a green economy by 2050. Our objective is to determine the most effective climate policy instrument to facilitate this transition. By utilizing a Dynamic Stochastic General Equilibrium (DSGE) model, we assess the effectiveness of three climate policy tools: a carbon tax, subsidies to green assets, and taxes on brown assets. Our results indicate that a combination of a carbon tax, along with differentiated taxes and subsidies on green and brown assets, proves to the most effective policy in reducing emissions while maintaining macroeconomic stability. The findings of this study demonstrate the need for policymakers to balance the immediate goals of reducing emissions with the economic costs involved. Implementing a gradual transition strategy may be preferable as it allows for mitigating the negative economic impacts while facilitating the shift towards a green economy.Keywords: green economy, carbon tax, DSGE model, climate policy, sustainable growth
Procedia PDF Downloads 227262 Knowledge, Attitude and Compliance of Secondary School Students Towards School Discipline Policy in Ibadan North Local Government Area of Oyo State, Nigeria
Authors: S. Yakubu, E. A. Isah
Abstract:
One of the objectives of the school discipline policy is to instill discipline among students. However, despite the availability of this policy in various secondary schools in Nigeria, there seem to be numerous cases of indiscipline among students, which has become a source of concern to all stakeholders in the education sector. In an attempt to proffer possible solutions to this unending challenge, the study investigated the influence of knowledge and attitude on compliance of secondary school students towards school discipline policy in Ibadan North Local Government Area of Oyo State, Nigeria. The descriptive survey research design was employed to collect the requisite data. The multi-stage sampling procedure was adopted to select 570 respondents as the sample for the study. The data collected were analyzed using statistical measures of Mean, Standard deviation and Pearson Product Moment Correlation. The findings of the study showed that knowledge and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State were significantly related (r =0.330, p<0.05). The study also revealed a significant relationship between attitude and compliance of school discipline policy among secondary school students in Ibadan North Local Government Area of Oyo State (r = 0.593, p<0.05). Based on the findings, it was recommended that school rules and regulations should be emphasized and given more awareness for easy compliance. Also, students should be encouraged to portray a positive attitude towards their respective rules and regulations.Keywords: knowledge, attitude, compliance, school discipline policy
Procedia PDF Downloads 1847261 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria
Authors: Egboja Simon, Agi Sunday
Abstract:
One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.Keywords: governance, security, food, development, conflict, hunger, society, sustainability
Procedia PDF Downloads 3297260 Rethinking Nigeria's Foreign Policy in the Age of Global Terrorism
Authors: Shuaibu Umar Abdul
Abstract:
This paper examines Nigeria’s foreign policy in the age of global terrorism. It worth saying that the threat of ‘terrorism’ is not peculiar to Western and Middle Eastern countries alone, its tentacles are now spreading all over, Africa inclusive. The issue of domestic terrorism in Nigeria has become pervasive since the return of democratic rule in 1999. This development has never been a witness in any form throughout the year of statehood in Nigeria, the issues of banditry, armed robbery, ritual killing, and criminal activities like kidnapping and pipeline vandalization, the breakdown of law and order, poorly managed infrastructural facilities and corruption remain synonymous to Nigeria. These acts of terrorism no doubt have constituted a challenge that necessitates the paradigm shift in Nigeria’s foreign policy. The study employed the conceptual framework of analysis to lead interrogation; secondary sources were used to generate data while descriptive and content analysis were considered for data presentation and interpretation. In view of the interrogation and discussion on the subject matter, the paper revealed that Nigerian government underrated and underestimated the strength of terrorism within and outside her policy hence, it becomes difficult to address. As a response to the findings and conclusion of the study, the paper recommends among others that Nigeria’s foreign policy has to be rethought, reshaped and remodeled in cognizance to the rising global terrorism for peace, growth and development in the country.Keywords: foreign policy, globe, Nigeria, rethinking, terrorism
Procedia PDF Downloads 3577259 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications
Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam
Abstract:
The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.Keywords: human security, migration, Myanmar, regional security, Rohingya
Procedia PDF Downloads 1527258 The Impact of Corporate Governance Attributes on Dividends Payouts Policy: Evidence from the Emerging Capital Market of Jordan
Authors: Amneh Alkurdi, Yasean Tahat, Hamzeh Almuali
Abstract:
Purpose: The primary objective of the present paper is to examine the impact of CG attributes, including the board size, independency, separation and managerial ownership) on firm dividend payouts policy; using a sample of 72 Jordanian listed companies for the period of 2007-2013. Methodology: The study does manually review the sample firm’s annual reports for data collection and use OLS regression to carry out this investigation. Findings: The findings indicate that CG attributes have a strong impact on dividend payouts policy. In particular, board size, independency and separation have had significant associations with dividends payouts indicating that such variables matter when determining on dividends which may mitigate the conflicts between stakeholders’ and managers’ interests. The results also indicate that managerial ownership has had no significant impact on the dividends policy suggesting that managers do not use the strength of their position to influence the dividends policy. Finally, the results show that firm size and profitability have had statistically positive associations with dividend payouts, while this was not the case for firm leverage and growth where significant and positive relationships were documented. Originality/implication: The current paper extends the extant literature in this field by investigating the impact of the board composition on dividends and provides some insights for policy makers in emerging markets.Keywords: corporate governance, dividends payouts policy, jordan, accounting
Procedia PDF Downloads 1917257 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 957256 Present-Day Transformations and Trends in Rooftop Agriculture and Food Security
Authors: Kiara Lawrence, Nadine Ponnusamy, Clive Greenstone
Abstract:
One of the major challenges facing society today is food security. The risks to food security have increased significantly due to the evolving urban landscape, globalization, and a rising population. The cultivation of food is essential, particularly during times of crisis, such as a recession, and has long been a necessity for urban populations. In contemporary society, many urban residents are confronted with new challenges, including high levels of unemployment, which compel individuals to adopt alternative survival strategies, such as growing their own food. Recently, rooftop agriculture has made significant contributions to urban and national food security and has been utilized as a tool to mitigate the frequent and damaging disasters that many cities encounter. They have the potential to transform unused spaces into green, productive vegetable plots, while also providing urban residents with the opportunity to enjoy the benefits of gardening. Therefore, this study looks to investigate the evolving themes around rooftop agriculture and food security globally. A bibliometric review analysis was carried out on Scopus and Web of Science using the keywords “rooftop agriculture” OR “rooftop farming” OR “rooftop garden” AND “food security” between 2004 and 2024 to ensure a broader scope was covered around the chosen study. Vosviewer software was then utilized to analyze the extracted data to create network visualization maps based on keyword occurrences, co-author analysis, country analysis. There were only 37 relevant documents within the study parameters. Preliminary results indicate that much research focused on urban agriculture, food supply, green roof, sustainability and climate change. By analysing these aspects of rooftop agriculture and food security, the trends can identify gaps in literature and dictate future applications to assist in food security.Keywords: food security, rooftop agriculture, rooftop farming, rooftop garden
Procedia PDF Downloads 157255 Industrial Policy Directions in Georgia
Authors: Nino Grigolaia
Abstract:
Introduction - The paper discusses the role of industrial policy in the development of the economy in the country. The main challenges on the way to the implementation of industrial policy are analyzed: the long-term period of industrial policy, the risk of changes in priorities, the limited scope and external shocks. Methodology - Various research methods are used in the paper. The methods of induction, deduction, analysis, synthesis, analogy, correlation and statistical observation are used. Main Findings - Based on the analysis of the current situation in Georgia, the obstacles to the country's industrialization and its supporting factors are identified. Also, the challenges of the country's core industrial policies are revealed. Specific industry development strategies, ways of state support and main directions of new industrial policies are identified. Conclusion - The paper concludes that the development of the industrial sector is critical for the future growth and development of the Georgian economy, which will accelerate the industrialization and structural transformation processes, reduce the trade deficit, increase the exports and create more jobs in the country. The listed changes will guarantee the improvement of the socio-economic situation of the population. Accordingly, it is revealed that the study of industrial policy in Georgia is still actual. Based on the analysis, relevant conclusions in the field of industrialization of the country are developed and recommendations are proposed.Keywords: industrialization , industrial policy, industrialization of the economy, Georgia priorities
Procedia PDF Downloads 1897254 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 3847253 On the Effectiveness of Electricity Market Development Strategies: A Target Model for a Developing Country
Authors: Ezgi Avci-Surucu, Doganbey Akgul
Abstract:
Turkey’s energy reforms has achieved energy security through a variety of interlinked measures including electricity, gas, renewable energy and energy efficiency legislation; the establishment of an energy sector regulatory authority; energy price reform; the creation of a functional electricity market; restructuring of state-owned energy enterprises; and private sector participation through privatization and new investment. However, current strategies, namely; “Electricity Sector Reform and Privatization Strategy” and “Electricity Market and Supply Security Strategy” has been criticized for various aspects. The present paper analyzes the implementation of the aforementioned strategies in the framework of generation scheduling, transmission constraints, bidding structure and general aspects; and argues the deficiencies of current strategies which decelerates power investments and creates uncertainties. We conclude by policy suggestions to eliminate these deficiencies in terms of price and risk management, infrastructure, customer focused regulations and systematic market development.Keywords: electricity markets, risk management, regulations, balancing and settlement, bilateral trading, generation scheduling, bidding structure
Procedia PDF Downloads 5517252 Comparison of Two Maintenance Policies for a Two-Unit Series System Considering General Repair
Authors: Seyedvahid Najafi, Viliam Makis
Abstract:
In recent years, maintenance optimization has attracted special attention due to the growth of industrial systems complexity. Maintenance costs are high for many systems, and preventive maintenance is effective when it increases operations' reliability and safety at a reduced cost. The novelty of this research is to consider general repair in the modeling of multi-unit series systems and solve the maintenance problem for such systems using the semi-Markov decision process (SMDP) framework. We propose an opportunistic maintenance policy for a series system composed of two main units. Unit 1, which is more expensive than unit 2, is subjected to condition monitoring, and its deterioration is modeled using a gamma process. Unit 1 hazard rate is estimated by the proportional hazards model (PHM), and two hazard rate control limits are considered as the thresholds of maintenance interventions for unit 1. Maintenance is performed on unit 2, considering an age control limit. The objective is to find the optimal control limits and minimize the long-run expected average cost per unit time. The proposed algorithm is applied to a numerical example to compare the effectiveness of the proposed policy (policy Ⅰ) with policy Ⅱ, which is similar to policy Ⅰ, but instead of general repair, replacement is performed. Results show that policy Ⅰ leads to lower average cost compared with policy Ⅱ.Keywords: condition-based maintenance, proportional hazards model, semi-Markov decision process, two-unit series systems
Procedia PDF Downloads 1227251 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 5677250 An Empirical Investigation of Uncertainty and the Lumpy Investment Channel of Monetary Policy
Authors: Min Fang, Jiaxi Yang
Abstract:
Monetary policy could be less effective at stimulating investment during periods of elevated volatility than during normal times. In this paper, we argue that elevated volatility leads to a decrease in extensive margin investment incentive so that nominal stimulus generates less aggregate investment. To do this, we first empirically document that high volatility weakens firms’ investment responses to monetary stimulus. Such effects depend on the lumpiness nature of the firm-level investment. The findings are that the channel exists for all of the physical investment, innovation investment, and organization investment.Keywords: investment, irreversibility, volatility, uncertainty, firm heterogeneity, monetary policy
Procedia PDF Downloads 1047249 Consumer Market of Agricultural Products and Agricultural Policy in Georgia
Authors: G. Erkomaishvili, M. Kobalava, T. Lazariashvili, M. Saghareishvili
Abstract:
The article discusses the consumer market of agricultural products and agricultural policy in Georgia. It is noted that development of the strategic areas of the agricultural sector needs a special support. These strategic areas should create the country's major export potential. It is important to develop strategies to access to the international markets, form extensive marketing network etc., which will become the basis for the promotion and revenue growth of the country. The Georgian agricultural sector, with the right state policy and support, can achieve success and gain access to the world market with competitive agricultural products. The paper discusses the current condition of agriculture, export and import of agricultural products and agricultural policy in Georgia. The conducted research concludes the information that there is an increasing demand on the green goods in the world market. Natural and climatic conditions of Georgia give a serious possibility of implementing it. The research presents an agricultural development strategy in Georgia and the findings and based on them recommendations are proposed.Keywords: agriculture, export-import of agricultural products, agricultural cooperative society, agricultural policy, agricultural insurance
Procedia PDF Downloads 3177248 Towards Renewable Energy: A Qualitative Study of Biofuel Development Policy in Indonesia
Authors: Arie Yanwar Kapriadi
Abstract:
This research is aiming to develop deeper understanding of the scale of power that shaped the biofuel policy. This research is important for the following reasons. Firstly, this research will enrich the body of literature within the field of political ecology, scale and environmental governance. Secondly, by focussing on energy transition policies, this research offers a critical perspective on how government policy, aimed at delivering low carbon sustainable energy systems, being scaled and implemented through multi variate stakeholders. Finally, the research could help the government of Indonesia as a policy evaluation on delivering low carbon sustainable energy systems at the macro level that (possibility) being unable to be delivered at different scale and instead being perceived differently by different stakeholders. Qualitative method is applied particularly an in depth interview with government officials as well as policy stakeholders outside of government and people in positions of responsibility with regards to policy delivery. There are 4 field study location where interview took place as well as sites visit to some biofuel refining facilities. There are some major companies which involve on the production and distribution of biofuel and its relation with biofuel feedstock industry as the source of data. The research investigates how the government biofuel policies correlated with other policy issues such as land reclassification and carbon emission reduction which also influenced plantations expansion as well as its impact on the local people. The preliminary result shows tension of power between governing authorities caused the Indonesian biofuel policy being unfocused which led to failing to meet its mandatory blending target despite the abundance of its feedstock.Keywords: biofuel, energy transition, renewable energy, political ecology
Procedia PDF Downloads 1967247 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.Keywords: digital signature, fault tolerance, RSA, security analysis
Procedia PDF Downloads 4747246 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene
Authors: Saidu I. R., Shittu S. S.
Abstract:
As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.Keywords: security, BYOD, vulnerability, risk, cyber hygiene
Procedia PDF Downloads 747245 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries
Authors: Carlos Alves
Abstract:
This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.Keywords: environmental sustainability, food security, nutrition, payments for environmental services
Procedia PDF Downloads 3917244 Health as an Agenda in Indian Politics: A Study of Election Manifestos in 16th General Elections
Authors: Kiran Bala
Abstract:
Health, education and employment opportunities available for a common citizen reflect the development status of a country. Health of an individual affects the growth of a country in every aspect. According to a study by WHO, India is estimated to lose more than $237 billion of its GDP over the period 2006-15 on account of premature death and morbidity from Non-communicable diseases alone. Each year 37 million people fall below poverty line due to high expenditure on health services they have to incur. Falling sick puts a double burden on them in terms of loss of income and expenditure on health care which pushes them further into debt and poverty. Adding to the gravity of situation, public spending on health in India has itself declined after liberalization from 1.3% of GDP in 1990 to 0.9% in 1999. The Approach Paper of the Government of India to the Twelfth Five Year Plan indicated that health expenditure alone as a per cent of GDP was about 1.4 per cent (B.E.) in 2011-12. It also mentioned that if one included expenditure on rural water supply and sanitation, the figure would be about 1.8 per cent. Given the abysmally low level of priority accorded to health in Indian economic policy, it becomes rather important to study the representation of health in the Indian public sphere. To this end, this study examines the prioritization of health in the public policy agenda of the national/regional political parties as evidenced in their election manifestos at a time when the nation is poised to go for the General Elections. The paper also focuses attention on the prioritization of health in the public perception as evidenced in their reasons for their preferences for a particular party or individual contestant. To arrive at the reasons for the priority level accorded by the political actors and the citizens, the study uses Focus groups of health policy makers, media persons, medical practitioners and voters. Collected data will be analysed in the theoretical framework of spiral of silence and agenda setting theory.Keywords: health, election manifestos, public perception, policies
Procedia PDF Downloads 3537243 The Re-Emergence of Russia Foreign Policy (Case Study: Middle East)
Authors: Maryam Azish
Abstract:
Russia, as an emerging global player in recent years, has projected a special place in the Middle East. Despite all the challenges it has faced over the years, it has always considered its presence in various fields with a strategy that has defined its maneuvering power as a level of competition and even confrontation with the United States. Therefore, its current approach is considered important as an influential actor in the Middle East. After the collapse of the Soviet Union, when the Russians withdrew completely from the Middle East, the American scene remained almost unrivaled by the Americans. With the start of the US-led war in Iraq and Afghanistan and the subsequent developments that led to the US military and political defeat, a new chapter in regional security was created in which ISIL and Taliban terrorism went along with the Arab Spring to destabilize the Middle East. Because of this, the Americans took every opportunity to strengthen their military presence. Iraq, Syria and Afghanistan have always been the three areas where terrorism was shaped, and the countries of the region have each reacted to this evil phenomenon accordingly. The West dealt with this phenomenon on a case-by-case basis in the general circumstances that created the fluid situation in the Arab countries and the region. Russian President Vladimir Putin accused the US of falling asleep in the face of ISIS and terrorism in Syria. In fact, this was an opportunity for the Russians to revive their presence in Syria. This article suggests that utilizing the recognition policy along with the constructivism theory will offer a better knowledge of Russia’s endeavors to endorse its international position. Accordingly, Russia’s distinctiveness and its ambitions for a situation of great power have played a vital role in shaping national interests and, subsequently, in foreign policy, in Putin's era in particular. The focal claim of the paper is that scrutinize Russia’s foreign policy with realistic methods cannot be attained. Consequently, with an aim to fill the prevailing vacuum, this study exploits the politics of acknowledgment in the context of constructivism to examine Russia’s foreign policy in the Middle East. The results of this paper show that the key aim of Russian foreign policy discourse, accompanied by increasing power and wealth, is to recognize and reinstate the position of great power in the universal system. The Syrian crisis has created an opportunity for Russia to unite its position in the developing global and regional order after ages of dynamic and prevalent existence in the Middle East as well as contradicting US unilateralism. In the meantime, the writer thinks that the question of identifying Russia’s position in the global system by the West has played a foremost role in serving its national interests.Keywords: constructivism, foreign Policy, middle East, Russia, regionalism
Procedia PDF Downloads 1487242 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe
Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran
Abstract:
The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.Keywords: access control, multimodal biometrics, pattern recognition, security safe
Procedia PDF Downloads 3307241 Holistic Approach for Natural Results in Facial Aesthetics
Authors: R. Denkova
Abstract:
Nowadays, aesthetic and psychological researches in some countries show that the aesthetic ideal for women is built by the same pattern of big volumes – lips, cheek, facial disproportions. They all look like made of a matrix. And they lose their unique and emotional aspects of beauty. How to escape this matrix and find the balance? The secret to being a unique injector is good assessment, creating a treatment plan and flawless injection strategy. The newest concepts in this new injection era which meet the requirements of a modern society and deliver balanced and natural looking results are based on the concept of injecting not the consequence, but the reason. Three case studies are presented with full face assessment, treatment plan and before/after pictures. Using different approaches and techniques of the MD codes concept, lights and shadows concept in order to preserve the emotional beauty and identity of the women. In conclusion, the cases demonstrate that beauty exists even beyond the matrix and it is the injector’s mission and responsibility is to preserve and highlight the natural beauty and unique identity of every different patient.Keywords: beyond the matrix, emotional beauty, face assessment, injector, treatment plan
Procedia PDF Downloads 1197240 Analyzing Environmental Emotive Triggers in Terrorist Propaganda
Authors: Travis Morris
Abstract:
The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.Keywords: propaganda analysis, emotive triggers environmental security, frames
Procedia PDF Downloads 1387239 Effects of Dividend Policy on Firm Profitability and Growth in Light of Present Economic Conditions
Authors: Madani Chahinaz
Abstract:
This study aims to shed light on the impact of dividend policy on corporate profitability and its relationship to growth, considering the economic developments taking place. The study was conducted on a sample of seven companies for the period from 2014 to 2020, based on a set of determinants to select variables affecting dividend distribution, where the descriptive analytical approach relied upon using graphical data models. The study concluded that companies that follow a well-studied dividend distribution policy enjoy higher profitability rates, which contributes to enhancing their growth in light of the economic developments taking place. There is also no statistically significant relationship between the variables of total asset growth and fixed asset growth and profitability. The study also concluded that there is statistical significance for the relationship between the sales volume growth variable, the self-financing ratio variable, and dividend distribution at a significance level of 0.05, as the random effects model was able to explain 68% of the changes in dividend distribution policy.Keywords: dividend distribution policy, profitability, growth, self-financing ratio
Procedia PDF Downloads 77238 Analysis on the Effectiveness of the "Three-Exemption" Policy Aimed at Promoting Unpaid Blood Donation in Zhejiang
Authors: Ni Tang, Jinping Zhang
Abstract:
An effective and sustainable volunteer team is needed to create a more available blood supply system. In order to promote the sustainable development of blood donation in Zhejiang Province, China, a “three-exemption” policy was proposed in 2014: blood donors who received the National Award for unpaid blood donation may government-invested and funded parks, scenic spots and other places for free, visit non-profit medical institutions for free outpatient fees, and be exempted from urban public transportation fees. As the policy has been in place for seven years, this study evaluated the effectiveness of the policy by comparing the increasing rate of blood donation in Hangzhou (capital city of Zhejiang) before and after the policy using the intermittent time series analysis. The blood donation in Anhui, a Province near Zhejiang, was also compared as a negative control. Blood donation data from 2012 to 2018 were obtained from the donation center's official websites. The increasing rate of blood donation volume since 2012 in Hangzhou is 34.37 units/month, and after 2014, the increasing rate additionally increases 71.69 (p=0.1442), which indicating a statistically non-significant change after the policy. While as a negative control, in Anhui, the increasing rate of blood donation volume since 2012 is -163.3 unit/month, and the increasing rate additionally increases 167.2 (p=5.63e-07) after 2014. The result shows that the three-exemption policy had a certain level of impact on encouraging volunteers to donate blood, but the effect was not substantial. One possible reason for the ineffectiveness of the policy might be a lack of public awareness of the policy. On the other hand, this policy mainly waived unnecessary life expenses, such as fares and scenic entrance fees, and requires a certain number of blood donations, registration procedures, and blood donation certificates. Perhaps, reducing life-related expenses such as oil, water and electricity, could better attract people to participate in blood donation. This current study on the three-exemption policy provides a new direction for promoting people's blood donation. Incentive policies may require greater publicity and incentives. In order to better ensure the operation of the blood donation system, other policies, especially incentive policies, should be further explored.Keywords: blood donation, policy, Zhejiang, unpaid blood donation, three-exemption policy
Procedia PDF Downloads 2087237 Electricity Market Reforms Towards Clean Energy Transition andnd Their Impact in India
Authors: Tarun Kumar Dalakoti, Debajyoti Majumder, Aditya Prasad Das, Samir Chandra Saxena
Abstract:
India’s ambitious target to achieve a 50 percent share of energy from non-fossil fuels and the 500-gigawatt (GW) renewable energy capacity before the deadline of 2030, coupled with the global pursuit of sustainable development, will compel the nation to embark on a rapid clean energy transition. As a result, electricity market reforms will emerge as critical policy instruments to facilitate this transition and achieve ambitious environmental targets. This paper will present a comprehensive analysis of the various electricity market reforms to be introduced in the Indian Electricity sector to facilitate the integration of clean energy sources and will assess their impact on the overall energy landscape. The first section of this paper will delve into the policy mechanisms to be introduced by the Government of India and the Central Electricity Regulatory Commission to promote clean energy deployment. These mechanisms include extensive provisions for the integration of renewables in the Indian Electricity Grid Code, 2023. The section will also cover the projection of RE Generation as highlighted in the National Electricity Plan, 2023. It will discuss the introduction of Green Energy Market segments, the waiver of Inter-State Transmission System (ISTS) charges for inter-state sale of solar and wind power, the notification of Promoting Renewable Energy through Green Energy Open Access Rules, and the bundling of conventional generating stations with renewable energy sources. The second section will evaluate the tangible impact of these electricity market reforms. By drawing on empirical studies and real-world case examples, the paper will assess the penetration rate of renewable energy sources in India’s electricity markets, the decline of conventional fuel-based generation, and the consequent reduction in carbon emissions. Furthermore, it will explore the influence of these reforms on electricity prices, the impact on various market segments due to the introduction of green contracts, and grid stability. The paper will also discuss the operational challenges to be faced due to the surge of RE Generation sources as a result of the implementation of the above-mentioned electricity market reforms, including grid integration issues, intermittency concerns with renewable energy sources, and the need for increasing grid resilience for future high RE in generation mix scenarios. In conclusion, this paper will emphasize that electricity market reforms will be pivotal in accelerating the global transition towards clean energy systems. It will underscore the importance of a holistic approach that combines effective policy design, robust regulatory frameworks, and active participation from market actors. Through a comprehensive examination of the impact of these reforms, the paper will shed light on the significance of India’s sustained commitment to a cleaner, more sustainable energy future.Keywords: renewables, Indian electricity grid code, national electricity plan, green energy market
Procedia PDF Downloads 407236 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study
Authors: Hanneke J. A. Smaling, Mandy Visser
Abstract:
One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.Keywords: covid-19, dementia, home care, long-term care, policy
Procedia PDF Downloads 1347235 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms
Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos
Abstract:
The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution
Procedia PDF Downloads 346