Search results for: cyber security and policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6310

Search results for: cyber security and policy

5650 Analysis on the Effectiveness of the "Three-Exemption" Policy Aimed at Promoting Unpaid Blood Donation in Zhejiang

Authors: Ni Tang, Jinping Zhang

Abstract:

An effective and sustainable volunteer team is needed to create a more available blood supply system. In order to promote the sustainable development of blood donation in Zhejiang Province, China, a “three-exemption” policy was proposed in 2014: blood donors who received the National Award for unpaid blood donation may government-invested and funded parks, scenic spots and other places for free, visit non-profit medical institutions for free outpatient fees, and be exempted from urban public transportation fees. As the policy has been in place for seven years, this study evaluated the effectiveness of the policy by comparing the increasing rate of blood donation in Hangzhou (capital city of Zhejiang) before and after the policy using the intermittent time series analysis. The blood donation in Anhui, a Province near Zhejiang, was also compared as a negative control. Blood donation data from 2012 to 2018 were obtained from the donation center's official websites. The increasing rate of blood donation volume since 2012 in Hangzhou is 34.37 units/month, and after 2014, the increasing rate additionally increases 71.69 (p=0.1442), which indicating a statistically non-significant change after the policy. While as a negative control, in Anhui, the increasing rate of blood donation volume since 2012 is -163.3 unit/month, and the increasing rate additionally increases 167.2 (p=5.63e-07) after 2014. The result shows that the three-exemption policy had a certain level of impact on encouraging volunteers to donate blood, but the effect was not substantial. One possible reason for the ineffectiveness of the policy might be a lack of public awareness of the policy. On the other hand, this policy mainly waived unnecessary life expenses, such as fares and scenic entrance fees, and requires a certain number of blood donations, registration procedures, and blood donation certificates. Perhaps, reducing life-related expenses such as oil, water and electricity, could better attract people to participate in blood donation. This current study on the three-exemption policy provides a new direction for promoting people's blood donation. Incentive policies may require greater publicity and incentives. In order to better ensure the operation of the blood donation system, other policies, especially incentive policies, should be further explored.

Keywords: blood donation, policy, Zhejiang, unpaid blood donation, three-exemption policy

Procedia PDF Downloads 196
5649 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study

Authors: Hanneke J. A. Smaling, Mandy Visser

Abstract:

One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.

Keywords: covid-19, dementia, home care, long-term care, policy

Procedia PDF Downloads 123
5648 The Re-Emergence of Russia Foreign Policy (Case Study: Middle East)

Authors: Maryam Azish

Abstract:

Russia, as an emerging global player in recent years, has projected a special place in the Middle East. Despite all the challenges it has faced over the years, it has always considered its presence in various fields with a strategy that has defined its maneuvering power as a level of competition and even confrontation with the United States. Therefore, its current approach is considered important as an influential actor in the Middle East. After the collapse of the Soviet Union, when the Russians withdrew completely from the Middle East, the American scene remained almost unrivaled by the Americans. With the start of the US-led war in Iraq and Afghanistan and the subsequent developments that led to the US military and political defeat, a new chapter in regional security was created in which ISIL and Taliban terrorism went along with the Arab Spring to destabilize the Middle East. Because of this, the Americans took every opportunity to strengthen their military presence. Iraq, Syria and Afghanistan have always been the three areas where terrorism was shaped, and the countries of the region have each reacted to this evil phenomenon accordingly. The West dealt with this phenomenon on a case-by-case basis in the general circumstances that created the fluid situation in the Arab countries and the region. Russian President Vladimir Putin accused the US of falling asleep in the face of ISIS and terrorism in Syria. In fact, this was an opportunity for the Russians to revive their presence in Syria. This article suggests that utilizing the recognition policy along with the constructivism theory will offer a better knowledge of Russia’s endeavors to endorse its international position. Accordingly, Russia’s distinctiveness and its ambitions for a situation of great power have played a vital role in shaping national interests and, subsequently, in foreign policy, in Putin's era in particular. The focal claim of the paper is that scrutinize Russia’s foreign policy with realistic methods cannot be attained. Consequently, with an aim to fill the prevailing vacuum, this study exploits the politics of acknowledgment in the context of constructivism to examine Russia’s foreign policy in the Middle East. The results of this paper show that the key aim of Russian foreign policy discourse, accompanied by increasing power and wealth, is to recognize and reinstate the position of great power in the universal system. The Syrian crisis has created an opportunity for Russia to unite its position in the developing global and regional order after ages of dynamic and prevalent existence in the Middle East as well as contradicting US unilateralism. In the meantime, the writer thinks that the question of identifying Russia’s position in the global system by the West has played a foremost role in serving its national interests.

Keywords: constructivism, foreign Policy, middle East, Russia, regionalism

Procedia PDF Downloads 134
5647 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 274
5646 How Does the Interaction between Environmental and Intellectual Property Rights Affect Environmental Innovation? A Study of Seven OECD Countries

Authors: Aneeq Sarwar

Abstract:

This study assesses the interaction between environmental and intellectual property policy on the rate of invention of environmental inventions and specifically tests for whether there is a synergy between stricter IP regimes and stronger environmental policies. The empirical analysis uses firm and industry-level data from seven OECD countries from 2009 to 2015. We also introduce a new measure of environmental inventions using a Natural Language Processing Topic Modelling technique. We find that intellectual property policy strictness demonstrates greater effectiveness in encouraging inventiveness in environmental inventions when used in combination with stronger environmental policies. This study contributes to existing literature in two ways. First, it devises a method for better identification of environmental technologies, we demonstrate how our method is more comprehensive than existing methods as we are better able to identify not only environmental inventions, but also major components of said inventions. Second, we test how various policy regimes affect the development of environmental technologies, we are the first study to examine the interaction of the environmental and intellectual property policy on firm level innovation.

Keywords: environmental economics, economics of innovation, environmental policy, firm level

Procedia PDF Downloads 141
5645 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 412
5644 On the Effectiveness of Electricity Market Development Strategies: A Target Model for a Developing Country

Authors: Ezgi Avci-Surucu, Doganbey Akgul

Abstract:

Turkey’s energy reforms has achieved energy security through a variety of interlinked measures including electricity, gas, renewable energy and energy efficiency legislation; the establishment of an energy sector regulatory authority; energy price reform; the creation of a functional electricity market; restructuring of state-owned energy enterprises; and private sector participation through privatization and new investment. However, current strategies, namely; “Electricity Sector Reform and Privatization Strategy” and “Electricity Market and Supply Security Strategy” has been criticized for various aspects. The present paper analyzes the implementation of the aforementioned strategies in the framework of generation scheduling, transmission constraints, bidding structure and general aspects; and argues the deficiencies of current strategies which decelerates power investments and creates uncertainties. We conclude by policy suggestions to eliminate these deficiencies in terms of price and risk management, infrastructure, customer focused regulations and systematic market development.

Keywords: electricity markets, risk management, regulations, balancing and settlement, bilateral trading, generation scheduling, bidding structure

Procedia PDF Downloads 543
5643 The Effect of a New Reimbursement Policy for Discharge Planning Service

Authors: Chueh Chi-An, Chan Hui-Ya

Abstract:

Background and Aim: National Health Insurance (NHI) Administration released a new reimbursement policy for hospital patients who received a superior discharge plan on April 1, 2016. Each case could be claimed 1,500 points for fee-of service with related documents. The policy is considered a solution to help reducing the crowding in the emergency department, the length of stay of hospital, unplanned readmission rate and unplanned ER visit. This study aim is to explore the effect of the new reimbursement policy for discharge planning service in a medical center. Methods: The discharge team explained to general wards the new policy and encouraged early assessment, communication and connecting to community care for patients. They stated the benefit from the policy and asked documenting for reimbursement claiming from April to May 2016. The imbursement fee of NHI declaration from June 2015 to October 2017 was collected. The indicators included hospital occupancy rate, hospital bed turnover rate, long-term hospitalization rate, and patients’ satisfaction were analyzed after the policy implemented. Results: The results showed that the amount of service declaration was increasing from 2 cases in February 2016 to 110 cases in October 2017, the application rate was increasing from 0.029% to 1.576% of all inpatient cases, and the average payment from NHI was around 148,500 NT dollars per month in 2017. There are no significant differences in the indicators among hospital occupancy rate, hospital bed turnover rate, long-term hospitalization rate, and patients’ satisfaction. Conclusion: To provide a good discharge plan require a specialized case manager, the new reimbursement policy is too complicated and the total fee-of-service hospital could claim is too limited to hiring one. The results suggest more strategies combine with the new reimbursement policy will be needed.

Keywords: discharge planning, reimbursement, unplanned ER visit, readmission rate

Procedia PDF Downloads 163
5642 A Novel Exploration/Exploitation Policy Accelerating Learning In Both Stationary And Non Stationary Environment Navigation Tasks

Authors: Wiem Zemzem, Moncef Tagina

Abstract:

In this work, we are addressing the problem of an autonomous mobile robot navigating in a large, unknown and dynamic environment using reinforcement learning abilities. This problem is principally related to the exploration/exploitation dilemma, especially the need to find a solution letting the robot detect the environmental change and also learn in order to adapt to the new environmental form without ignoring knowledge already acquired. Firstly, a new action selection strategy, called ε-greedy-MPA (the ε-greedy policy favoring the most promising actions) is proposed. Unlike existing exploration/exploitation policies (EEPs) such as ε-greedy and Boltzmann, the new EEP doesn’t only rely on the information of the actual state but also uses those of the eventual next states. Secondly, as the environment is large, an exploration favoring least recently visited states is added to the proposed EEP in order to accelerate learning. Finally, various simulations with ball-catching problem have been conducted to evaluate the ε-greedy-MPA policy. The results of simulated experiments show that combining this policy with the Qlearning method is more effective and efficient compared with the ε-greedy policy in stationary environments and the utility-based reinforcement learning approach in non stationary environments.

Keywords: autonomous mobile robot, exploration/ exploitation policy, large, dynamic environment, reinforcement learning

Procedia PDF Downloads 406
5641 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 367
5640 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 312
5639 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 146
5638 Economic Policy of Achieving National Competitive Advantage

Authors: Gulnaz Erkomaishvili, Eteri Kharaishvili, Marina Chavleishvili

Abstract:

The paper discusses the economic policy of increasing national competitiveness, the tools, and means which help the country to improve its competitiveness. The sectors of the economy, in which the country can achieve a competitive advantage, are studied. It is noted that the country’s economic policy plays an important role in obtaining and maintaining a competitive advantage - authority should take measures to ensure a high level of education; scientific and research activities should be funded by the state; foreign direct investments should be attracted mainly in science-intensive industries; adaptation with the latest scientific achievements of the modern world and deepening of scientific and technical cooperation. Stable business environment and export-oriented strategy is the basis for the country’s economic growth. The studies have shown that institutional reforms in Georgia are not enough to significantly improve the country's competitiveness.

Keywords: competitiveness, economic policy, competitiveness improvement strategy, competitiveness of Georgia

Procedia PDF Downloads 116
5637 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 555
5636 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 463
5635 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 379
5634 China's Middle East Policy and the Competition with the United States

Authors: Shabnam Dadparvar, Laijin Shen

Abstract:

This paper focuses on China’s policy in the Middle East and the rivalry with the U.S. The question is that what are the main factors on China’s Middle East policy and its competition with the U.S? The hypothesis regards to three effective factors: 'China’s energy dependency' on the Middle East, 'economy' and support for 'stability' in the Middle East. What is important in China’s competition with the U.S regarding to its Middle East policy is the substantial difference in ways of treating the countries of the region; China is committed to Westphalia model based on non-interference in internal affairs of the countries and respect the sovereignty of the governments. However, after 9/11, the U.S is seeking a balance between stability and change through intervention in the international affairs and in some cases is looking for a regime change. From the other hand, China, due to its dependency on the region’s energy welcomes America’s military presence in the region for providing stability. The authors by using a descriptive analytical method try to explain the situation of rivalry between China and the United States in Middle East. China is an 'emerging power' with high economic growth and in demand of more energy supply. The problem is that a rising power in the region is often a source of concern for hegemony.

Keywords: China's foreign policy, energy, hegemony, the Middle East

Procedia PDF Downloads 338
5633 Competitiveness and Pricing Policy Assessment for Resilience Surface Access System at Airports

Authors: Dimitrios J. Dimitriou

Abstract:

Considering a worldwide tendency, air transports are growing very fast and many changes have taken place in planning, management and decision making process. Given the complexity of airport operation, the best use of existing capacity is the key driver of efficiency and productivity. This paper deals with the evaluation framework for the ground access at airports, by using a set of mode choice indicators providing key messages towards airport’s ground access performance. The application presents results for a sample of 12 European airports, illustrating recommendations to define policy and improve service for the air transport access chain.

Keywords: airport ground access, air transport chain, airport access performance, airport policy

Procedia PDF Downloads 358
5632 The impact of International Trade on Maritime Ecosystems: Evidence from the California Emission Control Area and the Kelp Forests

Authors: Fabien Candau, Florian Lafferrere

Abstract:

This article analyses how an emission policy for vessels (named California’s Ocean-Going Vessel Fuel Rule) was implemented in 2009 in California impacts trade and marine biodiversity. By studying the decrease in emission levels anticipated by the policy, we measure not only the consequences for port activities but also for one of the most important marine ecosystems of the California Coast: the Kelp forests. Using the Difference in Difference (DiD) approach at the Californian ports level, we find that this policy has led to a significant decrease in trade volume during this period. Therefore, we find a positive and significant effect of shipping policy on kelp canopy and biomass growth by controlling the specific climatic and environmental characteristics of California coastal areas.

Keywords: international trade, shipping, marine biodiversity, emission control area

Procedia PDF Downloads 55
5631 Material Vitalism’s Potential Role in Informing EU Construction and Demolition Waste Policy

Authors: Cameron Jones

Abstract:

Emissions, produced by landfill waste from demolished obsolete buildings, have a damaging effect on both the Earth’s climate and human health. The philosophical theory of material vitalism - the potential for materials to react and emit harmful pollutants - therefore defines this construction and demolition waste (CDW) as having vitality. The European Union’s ‘Circular Economic Action Plan’ (CEAP) aims to mitigate the effects of CDW by prioritising the circularity of building materials. This dissertation examines how the philosophical theory of material vitalism can make an environmentally responsible contribution to CDW policy. The CEAP and Silvertown Quays development are used as case studies for the application of vitalism to policy revision. The study concludes that vitalism has a positive role to play in informing CDW policy, although its contribution is stronger in some areas. This is established by first appraising the aspects that relate to the obsolescence of buildings outlined in the EU’s existing CDW policies. Next, these policy directives are compared with the CE principles employed in the Silvertown Quays development. Subsequently, a keyword analysis model is used to categorise the language used in the CEAP, demonstrating how socio-political approaches to the CE and strategies to address resource scarcity could be strengthened to represent the EU’s policy aspirations more effectively. Recommendations are then made on how material vitalism could be utilised to strengthen legislation, arguing that a notable contribution can be made in most policy areas. Finally, theoretical testing of the impact of these revisions to policy on the case study development identified some practicalities for consideration in improving waste management outcomes.

Keywords: vitalism, construction waste, obsolescence, political ecology, exceptionalism

Procedia PDF Downloads 34
5630 Mending Broken Fences Policing: Developing the Intelligence-Led/Community-Based Policing Model(IP-CP) and Quality/Quantity/Crime(QQC) Model

Authors: Anil Anand

Abstract:

Despite enormous strides made during the past decade, particularly with the adoption and expansion of community policing, there remains much that police leaders can do to improve police-public relations. The urgency is particularly evident in cities across the United States and Europe where an increasing number of police interactions over the past few years have ignited large, sometimes even national, protests against police policy and strategy, highlighting a gap between what police leaders feel they have archived in terms of public satisfaction, support, and legitimacy and the perception of bias among many marginalized communities. The decision on which one policing strategy is chosen over another, how many resources are allocated, and how strenuously the policy is applied resides primarily with the police and the units and subunits tasked with its enforcement. The scope and opportunity for police officers in impacting social attitudes and social policy are important elements that cannot be overstated. How do police leaders, for instance, decide when to apply one strategy—say community-based policing—over another, like intelligence-led policing? How do police leaders measure performance and success? Should these measures be based on quantitative preferences over qualitative, or should the preference be based on some other criteria? And how do police leaders define, allow, and control discretionary decision-making? Mending Broken Fences Policing provides police and security services leaders with a model based on social cohesion, that incorporates intelligence-led and community policing (IP-CP), supplemented by a quality/quantity/crime (QQC) framework to provide a four-step process for the articulable application of police intervention, performance measurement, and application of discretion.

Keywords: social cohesion, quantitative performance measurement, qualitative performance measurement, sustainable leadership

Procedia PDF Downloads 281
5629 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 320
5628 Bilateral Trade Costs Analysis of Policy Barriers for Growth Oriented Strategies in Exports

Authors: Shabana Noureen, Zafar Mahmood

Abstract:

Economies consistently engage in trade across borders and face tariff, non-tariff barriers and other quotas that constitute trade costs. The trade costs imposed by policy barriers on exports are considered an impediment in the export growth rate. This work aims to measure over-year trends in total and bilateral trade costs and their trends in relevance to policy barriers (tariff and non-tariff). The analysis through the micro-founded theoretically based gravity model showed that the total trade costs have a general decreasing trend in the world while in the case of developing countries, the rate by which these trends decline is very low. Bilateral trade cost estimates associated with the policy barriers represent that the non-tariff barriers in a developing country have a major role in sustaining the high trade costs as compared to the tariff barriers. This ultimately leads to a low net declining rate. This work emphasizes that for developing countries the non-tariff barriers are a major factor that renders their exports and to be uncompetitive in the world market.

Keywords: trade costs, policy barriers, tariff barriers, non-tariff barriers, trade policies, export growth

Procedia PDF Downloads 248
5627 Teachers' Knowledge, Perceptions, and Attitudes towards Renewable Energy Policy in Malaysia

Authors: Kazi Enamul Hoque

Abstract:

Initiatives on sustainable development are currently aggressively pursued throughout the world. The Malaysian government has developed key policies and strategies for over 30 years to achieve the nation’s policy objectives which are designed to mitigate the issues of security, energy efficiency and environmental impact to meet the rising energy demand. Malaysia’s current focus is on developing effective policies on renewable energy (RE) in order to reduce dependency on fossil fuel and contribute towards mitigating the effects of climate change. In this light mass awareness should be considered as the highest priority to protect the environment and to escape disaster due to climate change. Schools can be the reliable and effective foundation to prepare students to get familiar with environmental issues such as renewable and non-renewable energy sources. Teachers can play a vital role to create awareness among students about the advantages and disadvantages of using different renewable and nonrenewable energy resources. Thus, this study aims to investigate teachers’ knowledge, perceptions and attitudes towards renewable energy through a survey aiming a sustainable energy future. Five hundred sets of questionnaires were distributed to the school teachers in Malaysia. Total 420 questionnaires were returned of which 410 were complete to analyze. Finding shows that teachers are very familiar with the renewable energy like solar, wind and also geothermal. Most teachers were not sure about the Photovoltaics and biodiesel. Furthermore, teachers are also aware that primary energy in Malaysia is imported fossil fuels. Most teachers heard about the renewable energy in Malaysia and only few claims that they did not hear of such things and the others said that they never heard of it. The outcomes of the study will assist the energy policy makers to use teachers to create mass awareness of energy usages for future planning.

Keywords: Malaysia, non-renewable energy, renewable energy, school teacher

Procedia PDF Downloads 420
5626 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 332
5625 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 325
5624 Text Analysis to Support Structuring and Modelling a Public Policy Problem-Outline of an Algorithm to Extract Inferences from Textual Data

Authors: Claudia Ehrentraut, Osama Ibrahim, Hercules Dalianis

Abstract:

Policy making situations are real-world problems that exhibit complexity in that they are composed of many interrelated problems and issues. To be effective, policies must holistically address the complexity of the situation rather than propose solutions to single problems. Formulating and understanding the situation and its complex dynamics, therefore, is a key to finding holistic solutions. Analysis of text based information on the policy problem, using Natural Language Processing (NLP) and Text analysis techniques, can support modelling of public policy problem situations in a more objective way based on domain experts knowledge and scientific evidence. The objective behind this study is to support modelling of public policy problem situations, using text analysis of verbal descriptions of the problem. We propose a formal methodology for analysis of qualitative data from multiple information sources on a policy problem to construct a causal diagram of the problem. The analysis process aims at identifying key variables, linking them by cause-effect relationships and mapping that structure into a graphical representation that is adequate for designing action alternatives, i.e., policy options. This study describes the outline of an algorithm used to automate the initial step of a larger methodological approach, which is so far done manually. In this initial step, inferences about key variables and their interrelationships are extracted from textual data to support a better problem structuring. A small prototype for this step is also presented.

Keywords: public policy, problem structuring, qualitative analysis, natural language processing, algorithm, inference extraction

Procedia PDF Downloads 577
5623 Effects of Education Equity Policy on Housing Prices: Evidence from Simultaneous Admission to Public and Private Schools Policy in Shanghai

Authors: Tianyu Chen

Abstract:

China's school district education policy has encouraged parents to purchase properties in school districts with high-quality education resources. Shanghai has implemented "Simultaneous Admission to Public and Private Schools" (SAPPS) since 2018, which has covered all nine-year compulsory education by 2020. This study examines the impact of SAPPS on the housing market, specifically the premium effect of houses located in dual-school districts. Based on the Hedonic Pricing Model and the Signaling Theory, data is collected from 585 second-hand house transactions in Pudong New Area, Shanghai, and it is analyzed with the Difference-in-Differences (DID) model. The results indicate that the implementation of SAPPS has exacerbated the premium of dual school district housing and weakened the effect of the policy to a certain degree. To ensure equal access to education for all students, the government should work both on the supply and demand sides of the education resource equation.

Keywords: simultaneous admission to public and private schools, housing prices, education policy, education equity

Procedia PDF Downloads 68
5622 Green Energy, Fiscal Incentives and Conflicting Signals: Analysing the Challenges Faced in Promoting on Farm Waste to Energy Projects

Authors: Hafez Abdo, Rob Ackrill

Abstract:

Renewable energy (RE) promotion in the UK relies on multiple policy instruments, which are required to overcome the path dependency pressures favouring fossil fuels. These instruments include targeted funding schemes and economy-wide instruments embedded in the tax code. The resulting complexity of incentives raises important questions around the coherence and effectiveness of these instruments for RE generation. This complexity is exacerbated by UK RE policy being nested within EU policy in a multi-level governance (MLG) setting. To gain analytical traction on such complexity, this study will analyse policies promoting the on-farm generation of energy for heat and power, from farm and food waste, via anaerobic digestion. Utilising both primary and secondary data, it seeks to address a particular lacuna in the academic literature. Via a localised, in-depth investigation into the complexity of policy instruments promoting RE, this study will help our theoretical understanding of the challenges that MLG and path dependency pressures present to policymakers of multi-dimensional policies.

Keywords: anaerobic digestion, energy, green, policy, renewable, tax, UK

Procedia PDF Downloads 357
5621 Public Policy for Quality School Lunch Development in Thailand

Authors: W. Kongnoo, J. Loysongkroa, S. Chotivichien, N. Viriyautsahakul, N. Saiwongse

Abstract:

Obesity, stunting and wasting problems among Thai school-aged children are increasing due to inappropriate food consumption behavior and poor environments for desirable nutritional behavior. Because of a low school lunch budget of only 0.40 USD per person per day, food quality is not up to nutritional standards. Therefore, the Health Department with the Education Ministry and the Thai Health Promotion Foundation have developed a quality school lunch project during 2009–2013. The program objectives were development and management of public policy to increase school lunch budget. The methods used a healthy public policy motivation process and movement in 241 local administrative organizations and 538 schools. The problem and solution research was organized to study school food and nutrition management, create a best practice policy mobilization model and hold a public hearing to motivate an increase of school meal funding. The results showed that local public policy has been motivated during 2009-2011 to increase school meal budget using local budgets. School children with best food consumption behavior and exercise increased from 13.2% in 2009 to 51.6% in 2013 and stunting decreased from 6.0% in 2009 to 4.7% in 2013. As the result of national policy motivation (2012-2013), the cabinet meeting on October 22, 2013 has approved an increase of school lunch budget from 0.40 USD to 0.62 USD per person per day. Thus, 5,800,469 school children nationwide have benefited from the budget increase.

Keywords: public policy, quality school lunch, Thailand, obesity

Procedia PDF Downloads 336