Search results for: urban space security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9125

Search results for: urban space security

8435 Smart-Textile Containers for Urban Mobility

Authors: René Vieroth, Christian Dils, M. V. Krshiwoblozki, Christine Kallmayer, Martin Schneider-Ramelow, Klaus-Dieter Lang

Abstract:

Green urban mobility in commercial and private contexts is one of the great challenges for the continuously growing cities all over the world. Bicycle based solutions are already and since a long time the key to success. Modern developments like e-bikes and high-end cargo-bikes complement the portfolio. Weight, aerodynamic drag, and security for the transported goods are the key factors for working solutions. Recent achievements in the field of smart-textiles allowed the creation of a totally new generation of intelligent textile cargo containers, which fulfill those demands. The fusion of technical textiles, design and electrical engineering made it possible to create an ecological solution which is very near to become a product. This paper shows all the details of this solution that includes an especially developed sensor textile for cut detection, a protective textile layer for intrusion prevention, an universal-charging-unit for energy harvesting from diverse sources and a low-energy alarm system with GSM/GPRS connection, GPS location and RFID interface.

Keywords: cargo-bike, cut-detection, e-bike, energy-harvesting, green urban mobility, logistics, smart-textiles, textile-integrity sensor

Procedia PDF Downloads 301
8434 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 357
8433 Urban Agriculture for Sustainable Cities: Using Wastewater and Urban Wetlands as Resource

Authors: Hussnain Mukhtar, Yu-Pin Lin

Abstract:

This paper deals with the concept of ecologically engineered system for sustainable agriculture production with the view of sustainable cities development. Sustainable cities offer numerous eco-services to its inhabitants, and where, among other issues, wastewater nutrients can be considered to be a valuable resource to be used for a sustainable enhancement of urban agriculture in wetlands. Existing cities can be transferred from being only consumer of food and other agriculture product into important resource conserving and sustainable generators of these products. The review provides the food production capacity through introduction of wastewater into urban wetlands, potential for nutrient recovery and ecological engineering intervention to reduce the risk of food contamination by pathogens. Finally, we discuss the potential nutrients accumulating in our cities, as an important aspect of sustainable urban development.

Keywords: ecological engineering, nutrient recovery, pathogens, urban agriculture, wetlands

Procedia PDF Downloads 241
8432 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 421
8431 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 47
8430 The Four Pillars of Islamic Design: A Methodology for an Objective Approach to the Design and Appraisal of Islamic Urban Planning and Architecture Based on Traditional Islamic Religious Knowledge

Authors: Azzah Aldeghather, Sara Alkhodair

Abstract:

In the modern urban planning and architecture landscape, with western ideologies and styles becoming the mainstay of experience and definitions globally, the Islamic world requires a methodology that defines its expression, which transcends cultural, societal, and national styles. This paper will propose a methodology as an objective system to define, evaluate and apply traditional Islamic knowledge to Islamic urban planning and architecture, providing the Islamic world with a system to manifest its approach to design. The methodology is expressed as Four Pillars which are based on traditional meanings of Arab words roughly translated as Pillar One: The Principles (Al Mabade’), Pillar Two: The Foundations (Al Asas), Pillar Three: The Purpose (Al Ghaya), Pillar Four: Presence (Al Hadara). Pillar One: (The Principles) expresses the unification (Tawheed) pillar of Islam: “There is no God but God” and is comprised of seven principles listed as: 1. Human values (Qiyam Al Insan), 2. Universal language as sacred geometry, 3. Fortitude© and Benefitability©, 4. Balance and Integration: conjoining the opposites, 5. Man, time, and place, 6. Body, mind, spirit, and essence, 7. Unity of design expression to achieve unity, harmony, and security in design. Pillar Two: The Foundations is based on two foundations: “Muhammad is the Prophet of God” and his relationship to the renaming of Medina City as a prototypical city or place, which defines a center space for collection conjoined by an analysis of the Medina Charter as a base for the humanistic design. Pillar Three: The Purpose (Al Ghaya) is comprised of four criteria: The naming of the design as a title, the intention of the design as an end goal, the reasoning behind the design, and the priorities of expression. Pillar Four: Presence (Al Hadara) is usually translated as a civilization; in Arabic, the root of Hadara is to be present. This has five primary definitions utilized to express the act of design: Wisdom (Hikma) as a philosophical concept, Identity (Hawiya) of the form, and Dialogue (Hiwar), which are the requirements of the project vis-a-vis what the designer wishes to convey, Expression (Al Ta’abeer) the designer wishes to apply, and Resources (Mawarid) available. The Proposal will provide examples, where applicable, of past and present designs that exemplify the manifestation of the Pillars. The proposed methodology endeavors to return Islamic urban planning and architecture design to its a priori position as a leading design expression adaptable to any place, time, and cultural expression while providing a base for analysis that transcends the concept of style and external form as a definition and expresses the singularity of the esoteric “Spiritual” aspects in a rational, principled, and logical manner clearly addressed in Islam’s essence.

Keywords: Islamic architecture, Islamic design, Islamic urban planning, principles of Islamic design

Procedia PDF Downloads 85
8429 Enabling Quantitative Urban Sustainability Assessment with Big Data

Authors: Changfeng Fu

Abstract:

Sustainable urban development has been widely accepted a common sense in the modern urban planning and design. However, the measurement and assessment of urban sustainability, especially the quantitative assessment have been always an issue obsessing planning and design professionals. This paper will present an on-going research on the principles and technologies to develop a quantitative urban sustainability assessment principles and techniques which aim to integrate indicators, geospatial and geo-reference data, and assessment techniques together into a mechanism. It is based on the principles and techniques of geospatial analysis with GIS and statistical analysis methods. The decision-making technologies and methods such as AHP and SMART are also adopted to address overall assessment conclusions. The possible interfaces and presentation of data and quantitative assessment results are also described. This research is based on the knowledge, situations and data sources of UK, but it is potentially adaptable to other countries or regions. The implementation potentials of the mechanism are also discussed.

Keywords: urban sustainability assessment, quantitative analysis, sustainability indicator, geospatial data, big data

Procedia PDF Downloads 344
8428 Estimation of Carbon Dioxide Absorption in DKI Jakarta Green Space

Authors: Mario Belseran

Abstract:

The issue of climate change become world attention where one of them increase in air temperature due to greenhouse gas emissions. This climate change is caused by gases in the atmosphere, one of which is CO2. DKI Jakarta as the capital has a dense population with a variety of existing land use. Land use that is dominated by settlements resulting in fewer green space, which functions to absorb atmospheric CO2. Image interpretation SPOT-7 is used to determine the greenness level of vegetation on a green space using the vegetation index NDVI, EVI, GNDVI and OSAVI. Measuring the diameter and height of trees were also performed to obtain the value of biomass that will be used as the CO2 absorption value. The CO2 absorption value that spread in Jakarta are classified into three classes: high, medium, and low. The distribution pattern of CO2 absorption value at green space in Jakarta dominance in the medium class with the distribution pattern is located in South Jakarta, East Jakarta, North Jakarta and West Jakarta. The distribution pattern of green space in Jakarta scattered randomly and more dominate in East Jakarta and South Jakarta

Keywords: carbon dioxide, DKI Jakarta, green space, SPOT-7, vegetation index

Procedia PDF Downloads 259
8427 Facets of an Upcoming Urban Industrial Hub: A Case Study of Gurgaon-Manesar

Authors: Raman Kumar Singh

Abstract:

Urbanization and economic growth are considered to be the most striking features of the past century. There is currently a radical demographic shift in progress worldwide, wherein people are moving from rural to urban areas at an increasing rate. The UN-Habitat report 2005 indicates that in 2025, 61 per cent of the 5 billion world population will reside in the urban areas with about 85 per cent of the development process taking place in the urban hinterlands widely referred to as ‘peri-urban’, ‘suburbs’, ‘urban fringe’, ‘city edge’, ‘metropolitan shadow’, or ‘urban sprawl’. In this context the study is broadly concerned with understanding the development of the industrial hub in the Gurgaon and its impact on the immediate neighbourhood. However studies have revealed that with the increase of industrial development the growth pattern changes rapidly, not only the growth of the urban area but the overall economy shifts from more agrarian to non-agrarian, with the change in the occupational pattern of the people. The process is mainly known as tertiarization, where a number of tertiary activities increase in comparison to primary or secondary. The change in the occupational pattern creates a pull factor on its immediate neighbourhood, which triggers the in- migrations from the rural areas as people come in the core urban area in search of the better job opportunities and increased standards of living. But this gives way to the unplanned growth of the urban fringe and the villages which tend to accommodate the migrants and in turn the pressure on the socio-economic infrastructure increases. Therefore, it becomes increasing necessary for the government institution and policy level intervention to provide an overall socio-economic growth along with rapid industrial growth.

Keywords: policy intervention, urban morphology, urban industrial hub, livelihood transformation

Procedia PDF Downloads 353
8426 Decision Trees Constructing Based on K-Means Clustering Algorithm

Authors: Loai Abdallah, Malik Yousef

Abstract:

A domain space for the data should reflect the actual similarity between objects. Since objects belonging to the same cluster usually share some common traits even though their geometric distance might be relatively large. In general, the Euclidean distance of data points that represented by large number of features is not capturing the actual relation between those points. In this study, we propose a new method to construct a different space that is based on clustering to form a new distance metric. The new distance space is based on ensemble clustering (EC). The EC distance space is defined by tracking the membership of the points over multiple runs of clustering algorithm metric. Over this distance, we train the decision trees classifier (DT-EC). The results obtained by applying DT-EC on 10 datasets confirm our hypotheses that embedding the EC space as a distance metric would improve the performance.

Keywords: ensemble clustering, decision trees, classification, K nearest neighbors

Procedia PDF Downloads 170
8425 Modeling Water Inequality and Water Security: The Role of Water Governance

Authors: Pius Babuna, Xiaohua Yang, Roberto Xavier Supe Tulcan, Bian Dehui, Mohammed Takase, Bismarck Yelfogle Guba, Chuanliang Han, Doris Abra Awudi, Meishui Lia

Abstract:

Water inequality, water security, and water governance are fundamental parameters that affect the sustainable use of water resources. Through policy formulation and decision-making, water governance determines both water security and water inequality. Largely, where water inequality exists, water security is undermined through unsustainable water use practices that lead to pollution of water resources, conflicts, hoarding of water, and poor sanitation. Incidentally, the interconnectedness of water governance, water inequality, and water security has not been investigated previously. This study modified the Gini coefficient and used a Logistics Growth of Water Resources (LGWR) Model to access water inequality and water security mathematically, and discussed the connected role of water governance. We tested the validity of both models by calculating the actual water inequality and water security of Ghana. We also discussed the implications of water inequality on water security and the overarching role of water governance. The results show that regional water inequality is widespread in some parts. The Volta region showed the highest water inequality (Gini index of 0.58), while the central region showed the lowest (Gini index of 0.15). Water security is moderately sustainable. The use of water resources is currently stress-free. It was estimated to maintain such status until 2132 ± 18, when Ghana will consume half of the current total water resources of 53.2 billion cubic meters. Effectively, water inequality is a threat to water security, results in poverty, under-development heightens tensions in water use, and causes instability. With proper water governance, water inequality can be eliminated through formulating and implementing approaches that engender equal allocation and sustainable use of water resources.

Keywords: water inequality, water security, water governance, Gini coefficient, moran index, water resources management

Procedia PDF Downloads 114
8424 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 291
8423 The Effects of Urban Public Spaces on Place Attachment in Large Cities: Examining Spatial Perception in Shenzhen’s Shekou Community as a Case Study

Authors: Xiaoxue Jin, Qiong Zhang

Abstract:

The rapid influx and ongoing flow of young migrants in large cities, alongside the emergence and evolution of new social media, have led to increased interpersonal alienation and weakened place attachment. In the interplay between individuals and space, urban public spaces play a pivotal role in meeting the multifaceted needs of individuals and fostering a sense of attachment. This article aims to investigate the relationship between the place characteristics of public spaces and individuals' needs and perceptions, with an aim to identify the factors influencing place attachment among the youth. This study is conducted in the Shekou community of Shenzhen, focusing on the youth residents to evaluate their place attachment levels and to analyze their perceptions of the place characteristics of selected public spaces. The influencing factors of public spaces on place attachment were sorted out through detailed data analysis. Research has found that rapid urbanization has led to spatial homogenization and spatial segregation caused by uneven resource distribution, which in turn diminishes the utilization of public spaces. The social characteristics of public spaces, such as the quality of social activities and spatial openness, are critical in forming place attachment. In this research, place characteristics impacting place attachment are categorized, aiming to reconstruct the characteristics of public space places and use them as a medium to explore the place attachment of young people, promote their independent creation and participation in public life, and enhance the dynamism between individuals and spaces.

Keywords: place attachment, place characteristics, public spaces, spatial perception

Procedia PDF Downloads 29
8422 A Study on the Strategy for Domestic Space Industry Activation

Authors: Hangil Park, Hwayeon Song, Jingyung Sim

Abstract:

In this study, a business ecosystem of a domestic space industry is comprehensively analyzed to derive the influence factors. The priority level of each element as well as the disparity between the ideal and reality are investigated through a literature review and an expert survey. The three major influence factors determined are: (a) investment scale and approach, (b) propulsion system, and (c) industrialization with overseas expansion. Related issues based on the current status are evaluated, followed by a proposed activation strategy. This research's findings offer a direction for R&D budget allocation and law system maintenance for the activation of the domestic space industry.

Keywords: space industry, activation, strategy, business ecosystem

Procedia PDF Downloads 352
8421 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 539
8420 3D Elasticity Analysis of Laminated Composite Plate Using State Space Method

Authors: Prathmesh Vikas Patil, Yashaswini Lomte Patil

Abstract:

Laminated composite materials have considerable attention in various engineering applications due to their exceptional strength-to-weight ratio and mechanical properties. The analysis of laminated composite plates in three-dimensional (3D) elasticity is a complex problem, as it requires accounting for the orthotropic anisotropic nature of the material and the interactions between multiple layers. Conventional approaches, such as the classical plate theory, provide simplified solutions but are limited in performing exact analysis of the plate. To address such a challenge, the state space method emerges as a powerful numerical technique for modeling the behavior of laminated composites in 3D. The state-space method involves transforming the governing equations of elasticity into a state-space representation, enabling the analysis of complex structural systems in a systematic manner. Here, an effort is made to perform a 3D elasticity analysis of plates with cross-ply and angle-ply laminates using the state space approach. The state space approach is used in this study as it is a mixed formulation technique that gives the displacements and stresses simultaneously with the same level of accuracy.

Keywords: cross ply laminates, angle ply laminates, state space method, three-dimensional elasticity analysis

Procedia PDF Downloads 80
8419 Research Inspiration for Urban Renewal in Regions with Historical Value in Developed Areas of China: A Case Study of the Hubei Ancient Village

Authors: Qingxiang Zeng

Abstract:

Since the beginning of the 21st century, China's urbanization process has rapidly progressed. Since 2005, China's developed regions have gradually entered the stage of urban conservation and updating. The over-pursuit of economic market benefits in urban construction in China has led to issues such as disrespect for residents' rights, neglect of historical context protection, and gentlemanization, which hinder urban social development in some developed urban areas. This article takes the Hubei Ancient Village renewal project in Shenzhen, China, as an example. The project took eight years to obtain government approval and implementation since its renewal proposal was launched, which has attracted attention from society and urban planning circles. Through an introduction to the project's general situation and renewal process, this article reflects on the issues of planning systems, historical context protection, conflicts between multiple values, and neglect of vulnerable groups in the Hubei Ancient Village renewal and protection project. Based on this reflection, this article summarizes the corresponding experience and provides theoretical help for urban renewal in developed regions in China, providing case references for urban renewal and construction in other developing countries and offering critical thinking and valuable experience for urban planning practitioners and policymakers.

Keywords: urban renewal, Hubei Ancient Village, historical context, public participation

Procedia PDF Downloads 44
8418 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 336
8417 Locative Media Apps for Re-Building Urban Experience: Discovering Cities Through Technology

Authors: Kerem Rızvanoglu, Serhat Güney, Betül Aydoğan, Emre Kızılkaya, Ayşegül Boyalı, Onurcan Güden

Abstract:

This study investigates the urban experience of international students coming to Istanbul with exchange programs and reveals how locative media applications accompany their urban experiences. The sample of the research consists of international students who lived, perceived, and conceived the city on a daily basis during the academic year of 2022. Focusing on this particular sample would demonstrate the opportunities and authentic experiences offered by the city as well as the prevalent urban problems for the foreigners. In this regard, international students' urban experience in Istanbul, the blockages they encounter as resident tourists, the hotspots that the city offers, and the role of locative media in enriching the urban experience are the main axes to be evaluated. In the first step of the multi-staged research, we conduct an online qualitative survey with a sample; then, we evaluate the data obtained from the survey using cluster analysis to identify the urban experience, consumption habits, and tastes. In the final stage, digital ethnographic fieldwork will be carried out with representative personas identified by the cluster analysis. With this field research on the urban experience accompanied by locative media applications, suggestions will be developed by evaluating the opportunities these applications offer to enrich the urban practice of foreigners.

Keywords: digital ethnography, international students, locative media applications, urban experience

Procedia PDF Downloads 125
8416 Multidisciplinary Training of Social Work and Applied Drama: From the Perspective of the Third Space

Authors: Yen Yi Huang

Abstract:

This paper aims to explore the application of strategies in applied drama to the social work education arena in order to enhance students' creativity, curiosity, and aesthetic sensitivity. Also, applied drama is used as a means to facilitate students' reflection-in-action and improve their understanding of issues on creative aging, gender equality, human rights, bullying, and prejudice. This paper mainly uses the perspective of Homi K. Bhabha's third space to explore the impact of applied drama and social work training on students. First, it focuses on how students create new understandings and insights in the third space of multidisciplinary training studies. Second, it analyzes how the hybridity and negotiation of ideas between applied drama and social work were created. Finally, it discusses the follow-up effects of the training and the factors that promote or hinder the hybridity and generation of the third space. This paper uses students' reflection papers for analysis. It is not focused on a discussion of the effectiveness of the teaching but attempts to bring new insights into the applications of applied drama to the social work education arena. The hybridity and generation of the third space require handling power strategically and looking after the emotional space of the students. Taking part in the training allows students in the third space of multidisciplinary training to reexamine the traditional framework of social work knowledge to create new ideas and possibilities.

Keywords: multidisciplinary, applied drama, social work education, third space

Procedia PDF Downloads 150
8415 Food Security and Mental Health: A Qualitative Exploration of Mediating Factors in Rural and Urban Ghana

Authors: Emma Mathias

Abstract:

The aim of this study was to explore the role of food insecurity as a mediator of mental health in sub-Saharan Africa, taking Ghana as a case study. Although a quantitative correlation has recently been established between food insecurity and mental illness in Ghana, the nature and validity of this correlation remains unclear. A qualitative exploration was employed to investigate this correlation further. During the data collection period, twelve semi-structured interviews and five focus groups were conducted with a total of 124 individuals who were diagnosed with mental illnesses and their primary carers throughout rural and urban areas in Ghana. Interviews and focus groups were transcribed, translated, and analysed using thematic analysis. Preliminary results suggest that food insecurity may plays a role in mental illness in rural areas of Ghana where communities are reliant on agriculture for their livelihoods, but may play a lesser role in urban areas where communities are more reliant on petty trade as a source of livelihood. These results support psychosocial theories which suggest that the social and cultural factors involved in food production and consumption may be the key mediators between food insecurity and mental health.

Keywords: Food insecurity, Ghana, Mental health, Phenomenology

Procedia PDF Downloads 125
8414 Comparative Study of Urban Structure between an Island-Type and a General-Type City

Authors: Tomoya Oshiro, Hiroko Ono

Abstract:

Japan's aging population is increasing due to the decrease in birthrate. It causes various problems like the decrease in the gross domestic product of the country. The reason is why the local government of Japan has been on the way to a sustainable city recently. Then it is essential to get control of an urban structure to make the compact city successful. There are many kinds of paper about the compact city; however, the paper about a compact city of the island-type city is less. The purpose of this study is to clarify difference of urban structure between an island-type and a general city type. The method which has conducted in this research has two steps. First of all, by using evaluation indexes in the handbook, we evaluated the urban structures among each same -population-class cities from 50,000 to 100,000 people. Next, to clear the difference about the urban structure and feature between island-type and general-type cities compare the radar chart which is composed with each evaluation indexes of urban structure. Moreover, in order to clarify the relationship between evaluation indexes and the place of residence by using GIS software to show up population density on the map. As a result of this research, the management of local government and the local economy in evaluation indexes are indicated to be negative point in comparison of island-type cities with general cities. However, evaluation indexes of safety/security and low-carbon/energy are proved to be positive point. The research to find the difference features of the island-type of urban structure proves that the management of local government or the local economy is negative point in these island-type cities. In addition, the public transportation coverage in Miyako Island, Sado Island, and Amakusa Island show low value compare with other islands and average value. Relationship between evaluation indexes of an urban structure and the place of residence prove that the place of residence is related to public transportation coverage. If the place of residence is spread out, the public transportation coverage will be decreased. The results of this research reveal that the finances in island-type cities are negative point compare to general cities. This problem is caused by declining population. In addition, the place of residence is related to the public transportation coverage. Even though, it needs a much money to increase the public transportation coverage. It is possibly to cause other problems furthermore the aspect of finance is influenced by that as well. The conclusion in this research suggests that it is important for creating the compact city in island-type cities that we first need to address solving the problems about the management of local government and the local economy.

Keywords: sustainable city, comparative analysis, geographic information system, urban structure

Procedia PDF Downloads 136
8413 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 321
8412 Incentive Policies to Promote Green Infrastructure in Urban Jordan

Authors: Zayed Freah Zeadat

Abstract:

The wellbeing of urban dwellers is strongly associated with the quality and quantity of green infrastructure. Nevertheless, urban green infrastructure is still lagging in many Arab cities, and Jordan is no exception. The capital city of Jordan, Amman, is becoming more urban dense with limited green spaces. The unplanned urban growth in Amman has caused several environmental problems such as urban heat islands, air pollution, and lack of green spaces. This study aims to investigate the most suitable drivers to leverage the implementation of urban green infrastructure in Jordan through qualitative and quantitative analysis. The qualitative research includes an extensive literature review to discuss the most common drivers used internationally to promote urban green infrastructure implementation in the literature. The quantitative study employs a questionnaire survey to rank the suitability of each driver. Consultants, contractors, and policymakers were invited to fill the research questionnaire according to their judgments and opinions. Relative Importance Index has been used to calculate the weighted average of all drivers and the Kruskal-Wallis test to check the degree of agreement among groups. This study finds that research participants agreed that indirect financial incentives (i.e., tax reductions, reduction in stormwater utility fee, reduction of interest rate, density bonus, etc.) are the most effective incentive policy whilst granting sustainability certificate policy is the least effective driver to ensure widespread of UGI is elements in Jordan.

Keywords: urban green infrastructure, relative importance index, sustainable urban development, urban Jordan

Procedia PDF Downloads 139
8411 On Flow Consolidation Modelling in Urban Congested Areas

Authors: Serban Stere, Stefan Burciu

Abstract:

The challenging and continuously growing competition in the urban freight transport market emphasizes the need for optimal planning of transportation processes in terms of identifying the solution of consolidating traffic flows in congested urban areas. The aim of the present paper is to present the mathematical framework and propose a methodology of combining urban traffic flows between the distribution centers located at the boundary of a congested urban area. The three scenarios regarding traffic flow between consolidation centers that are taken into consideration in the paper are based on the same characteristics of traffic flows. The scenarios differ in terms of the accessibility of the four consolidation centers given by the infrastructure, the connections between them, and the possibility of consolidating traffic flows for one or multiple destinations. Also, synthetical indicators will allow us to compare the scenarios considered and chose the indicated for our distribution system.

Keywords: distribution system, single and multiple destinations, urban consolidation centers, traffic flow consolidation schemes

Procedia PDF Downloads 142
8410 Optimization of Feeder Bus Routes at Urban Rail Transit Stations Based on Link Growth Probability

Authors: Yu Song, Yuefei Jin

Abstract:

Urban public transportation can be integrated when there is an efficient connection between urban rail lines, however, there are currently no effective or quick solutions being investigated for this connection. This paper analyzes the space-time distribution and travel demand of passenger connection travel based on taxi track data and data from the road network, excavates potential bus connection stations based on potential connection demand data, and introduces the link growth probability model in the complex network to solve the basic connection bus lines in order to ascertain the direction of the bus lines that are the most connected given the demand characteristics. Then, a tree view exhaustive approach based on constraints is suggested based on graph theory, which can hasten the convergence of findings while doing chain calculations. This study uses WEI QU NAN Station, the Xi'an Metro Line 2 terminal station in Shaanxi Province, as an illustration, to evaluate the model's and the solution method's efficacy. According to the findings, 153 prospective stations have been dug up in total, the feeder bus network for the entire line has been laid out, and the best route adjustment strategy has been found.

Keywords: feeder bus, route optimization, link growth probability, the graph theory

Procedia PDF Downloads 60
8409 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 445
8408 The Big Bang Was Not the Beginning, but a Repeating Pattern of Expansion and Contraction of the Spacetime

Authors: Amrit Ladhani

Abstract:

The cyclic universe theory is a model of cosmic evolution according to which the universe undergoes endless cycles of expansion and cooling, each beginning with a “big bang” and ending in a “big crunch”. In this paper, we propose a unique property of Space-time. This particular and marvelous nature of space shows us that space can stretch, expand, and shrink. This property of space is caused by the size of the universe change over time: growing or shrinking. The observed accelerated expansion, which relates to the stretching of Shrunk space for the new theory, is derived. This theory is based on three underlying notions: First, the Big Bang is not the beginning of Space-time, but rather, at the very beginning fraction of a second, there was an infinite force of infinite Shrunk space in the cosmic singularity that force gave rise to the big bang and caused the rapidly growing of space, and all other forms of energy are transformed into new matter and radiation and a new period of expansion and cooling begins. Second, there was a previous phase leading up to it, with multiple cycles of contraction and expansion that repeat indefinitely. Third, the two principal long-range forces are the gravitational force and the repulsive force generated by shrink space. They are the two most fundamental quantities in the universe that govern cosmic evolution. They may provide the clockwork mechanism that operates our eternal cyclic universe. The universe will not continue to expand forever; no need, however, for dark energy and dark matter. This new model of Space-time and its unique properties enables us to describe a sequence of events from the Big Bang to the Big Crunch.

Keywords: dark matter, dark energy, cosmology, big bang and big crunch

Procedia PDF Downloads 60
8407 Ta-DAH: Task Driven Automated Hardware Design of Free-Flying Space Robots

Authors: Lucy Jackson, Celyn Walters, Steve Eckersley, Mini Rai, Simon Hadfield

Abstract:

Space robots will play an integral part in exploring the universe and beyond. A correctly designed space robot will facilitate OOA, satellite servicing and ADR. However, problems arise when trying to design such a system as it is a highly complex multidimensional problem into which there is little research. Current design techniques are slow and specific to terrestrial manipulators. This paper presents a solution to the slow speed of robotic hardware design, and generalizes the technique to free-flying space robots. It presents Ta-DAH Design, an automated design approach that utilises a multi-objective cost function in an iterative and automated pipeline. The design approach leverages prior knowledge and facilitates the faster output of optimal designs. The result is a system that can optimise the size of the base spacecraft, manipulator and some key subsystems for any given task. Presented in this work is the methodology behind Ta-DAH Design and a number optimal space robot designs.

Keywords: space robots, automated design, on-orbit operations, hardware design

Procedia PDF Downloads 57
8406 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 310