Search results for: future security environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17294

Search results for: future security environment

16574 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 424
16573 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 29
16572 Urban Change Detection and Pattern Analysis Using Satellite Data

Authors: Shivani Jha, Klaus Baier, Rafiq Azzam, Ramakar Jha

Abstract:

In India, generally people migrate from rural area to the urban area for better infra-structural facilities, high standard of living, good job opportunities and advanced transport/communication availability. In fact, unplanned urban development due to migration of people causes seriou damage to the land use, water pollution and available water resources. In the present work, an attempt has been made to use satellite data of different years for urban change detection of Chennai metropolitan city along with pattern analysis to generate future scenario of urban development using buffer zoning in GIS environment. In the analysis, SRTM (30m) elevation data and IRS-1C satellite data for the years 1990, 2000, and 2014, are used. The flow accumulation, aspect, flow direction and slope maps developed using SRTM 30 m data are very useful for finding suitable urban locations for industrial setup and urban settlements. Normalized difference vegetation index (NDVI) and Principal Component Analysis (PCA) have been used in ERDAS imagine software for change detection in land use of Chennai metropolitan city. It has been observed that the urban area has increased exponentially in Chennai metropolitan city with significant decrease in agriculture and barren lands. However, the water bodies located in the study regions are protected and being used as freshwater for drinking purposes. Using buffer zone analysis in GIS environment, it has been observed that the development has taken place in south west direction significantly and will do so in future.

Keywords: urban change, satellite data, the Chennai metropolis, change detection

Procedia PDF Downloads 408
16571 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 252
16570 The Studies of the Impact of Biomimicry and Sustainability on Urban Design

Authors: Nourhane Mohamed El Haridi, Mostafa El Arabi, Zeyad El Sayad

Abstract:

Biomimicry is defined, by Benyus the natural sciences writer, as imitating or taking inspiration from nature’s forms and processes to solve human problems. Biomimicry is the conscious emulation of life’s genius. As the design community realizes the tremendous impact human constructions have on the world, environmental designers look to new approaches like biomimicry to advance sustainable design. Building leading the declaration made by biomimicry scientists that a full imitation of nature engages form, ecosystem, and process; this paper uses a logic approach to interpret human and environmental wholeness. Designers would benefit from both integrating social theory with environmental thinking and from combining their substantive skills with techniques for getting sustainable biomimic urban design. Integrating biomimicryʹs “Life’s Principles” into a built environment process model will make biomimicry more accessible and thus more widely accepted throughout the industry, and the sustainability of all species will benefit. The Biomimicry Guild hypothesizes the incorporation of these principles, called Lifeʹs Principles, increase the likelihood of sustainability for a respective design, and make it more likely that the design will have a greater impact on sustainability for future generations of all species as mentioned by Benyus in her book. This thesis utilizes Life’s Principles as a foundation for a design process model intended for application on built environment projects at various scales. This paper takes a look at the importance of the integration of biomimicry in urban design to get more sustainable cities and better life, by analyzing the principles of both sustainability and biomimicry, and applying these ideas on futuristic or existing cities to make a biomimic sustainable city more healthier and more conductive to life, and get a better biomimic urban design. A group of experts, architects, biologists, scientists, economists and ecologists should work together to face all the financial and designing difficulties, to have better solutions and good innovative ideas for biomimic sustainable urban design, it is not the only solution, but it is one of the best studies for a better future.

Keywords: biomimicry, built environment, sustainability, urban design

Procedia PDF Downloads 523
16569 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 406
16568 Apparent Ageing Mechanism of Polyurethane Coating in Typical Atmospheric Environment

Authors: Jin Gao, Jin Zhang, Xiaogang Li

Abstract:

Outdoor exposure experiments were conducted in three extreme environments, namely the Chinese plateau mountain environment (Lhasa), the cold–temperate environment (Mohe), and the marine atmospheric environment (Wanning), to track a new long-life environment-friendly polyurethane coating. The relationship between apparent properties, namely gloss and microstructural changes, was analyzed, and the influence of typical climatic environment on the aging mechanism of polyurethane coatings was discussed. Results show that the UV radiation in the Lhasa area causes photoaging degradation, micropores are formed on the coating surface, and the powdering phenomenon is obvious. Photodegradation occurs in the Wanning area, and a hydrolysis reaction is observed. The hydrolysis reaction catalyzes the photoaging, the coating surface becomes yellow, and the powdering becomes serious. Photoaging is also present in the Mohe area, but it is mainly due to temperature changes that in turn change the internal stress of the coating. Microcracks and bumps form on the coating surface.

Keywords: aging, atmospheric environment, outdoor exposure, polyurethane coating

Procedia PDF Downloads 126
16567 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters

Authors: Vikram Chowdhary, Marek Vins

Abstract:

The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.

Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID

Procedia PDF Downloads 111
16566 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study

Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly

Abstract:

In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.

Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions

Procedia PDF Downloads 82
16565 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 55
16564 The Development and Testing of Greenhouse Comprehensive Environment Control System

Authors: Mohammed Alrefaie, Yaser Miaji

Abstract:

Greenhouses provide a convenient means to grow plants in the best environment. They achieve this by trapping heat from the sunlight and using artificial means to enhance the environment of the greenhouse. This includes controlling factors such as air flow, light intensity and amount of water among others that can have a big impact on plant growth. The aim of the greenhouse is to give maximum yield from plants possible. This report details the development and testing of greenhouse environment control system that can regulate light intensity, airflow and power supply inside the greenhouse. The details of the module development to control these three factors along with results of testing are presented.

Keywords: greenhouse, control system, light intensity, comprehensive environment

Procedia PDF Downloads 482
16563 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 235
16562 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 165
16561 Air Quality Analysis Using Machine Learning Models Under Python Environment

Authors: Salahaeddine Sbai

Abstract:

Air quality analysis using machine learning models is a method employed to assess and predict air pollution levels. This approach leverages the capabilities of machine learning algorithms to analyze vast amounts of air quality data and extract valuable insights. By training these models on historical air quality data, they can learn patterns and relationships between various factors such as weather conditions, pollutant emissions, and geographical features. The trained models can then be used to predict air quality levels in real-time or forecast future pollution levels. This application of machine learning in air quality analysis enables policymakers, environmental agencies, and the general public to make informed decisions regarding health, environmental impact, and mitigation strategies. By understanding the factors influencing air quality, interventions can be implemented to reduce pollution levels, mitigate health risks, and enhance overall air quality management. Climate change is having significant impacts on Morocco, affecting various aspects of the country's environment, economy, and society. In this study, we use some machine learning models under python environment to predict and analysis air quality change over North of Morocco to evaluate the climate change impact on agriculture.

Keywords: air quality, machine learning models, pollution, pollutant emissions

Procedia PDF Downloads 91
16560 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women

Authors: Abeer Al Kalbani

Abstract:

Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.

Keywords: food security, household food security, utilization, role of women

Procedia PDF Downloads 405
16559 Evaluation of Traditional Housing Texture in Context of Sustainability

Authors: Esra Yaldız, Dicle Aydın

Abstract:

Sustainability is a term that provides deciding about the future considering environment and investigates the harmony and balance between protection and usage of the resource. The main objective of sustainability is creating residential areas is nature compatible or providing continuance thereby adapting existing residential area to nature. In this context, historical and traditional areas must have utilized according to sustainability. Traditional housing texture are identified as a traditional architectural product has been designed based on this term. General characteristics of traditional housing within the context of sustainable architecture are their specific dynamics and components and their harmonisation of environment and nature. Owing to the fact that traditional housing texture harmonizes natural conditions of the region, topography, climate and their context, construction materials are provided from environment and traditional techniques and their forms are used and due to construction materials has natural insulation traditional housing create healthy and comfortable living environment, traditional housing is rather significant in terms of sustainable architecture. The basis of this study comprise the routers in traditional housing design in accordance with the principles of sustainability. These are, accommodating topography, climate, and geography, accessibility, structuring at the scale of human, utilization of green zones, unique to the region used construction materials, the form of construction, building envelope and space organization of dwelling. In this context, the purpose of this study is that vernacular architecture approaches of traditional housing textures which are in Central Anatolia Region Located in Anatolia are utilized with regard to sustainability.

Keywords: Anatolia, sustainability, traditional housing texture, vernacular architecture

Procedia PDF Downloads 453
16558 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
16557 Building Children's Capacity towards Sustainable Future: Making a Case for a Socio-Cultural Approach to Understanding Sustainability

Authors: Taiwo Frances Gbadegesin

Abstract:

Children’s capacity to contribute to social and economic status of a nation has been given more recognition than ever. Global policy priority aimed at ensuring sustainable development has been extended to the developing nations of the world. However, many developing countries have continued to puzzle out the extent and possibilities of exploring sustainability within their socio-economic environment. This paper considers ways in which the theoretical framework of Dahlberg, Moss and Pence (1999; 2007) and Moss (2007; 2012) that embraces meaning-making, social construction of childhood experiences and democratic perspectives can be used to understand children’s capacity for building a sustainable future. This paper presents data collected through interviews and observations from ECCE teachers and children in Lagos, Nigeria. A distinct finding is that children’s participation in building sustainable future is a consequence of the knowledge of the workings of their social, economic and cultural nuances and not a matter of economic wealth per se. It further argues that sustainability is situated within a complex network of local and global contexts. It thus challenges the present neo-liberal approach and advocates a democratic approach to preparing children for a sustainable society. It concludes that sustainability cannot be built on what may be seen as decontextualized responses by relevant stakeholders to the needs and experiences of the “whole child”.

Keywords: children, ECCE, sustainable development, Nigeria

Procedia PDF Downloads 360
16556 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 455
16555 Assessment of the Economic Factors and Motivations towards De-Dollarization since the Early 2000s and Their Implications

Authors: Laila Algalal, Chen Xi

Abstract:

The US dollar has long served as the world's primary reserve currency. However, this dominance faces growing challenges from internal US economic pressures and the rise of alternative currencies. Internally, issues like high debt, inflation, reduced competitiveness, and economic instability due to inequality in economic policies threaten the dollar's position. Externally, more countries are establishing alternative currencies, payment systems, and regional financial institutions to reduce dollar dependence. These drivers have contributed to a decline in the dollar's share of global foreign exchange reserves from 71% in 2001 to an estimated 58% in 2022. While this 13-percentage point drop took two decades, recent initiatives suggest de-dollarization could accelerate in the coming few decades. Efforts to establish non-dollar trade deals and alternative financial systems show more substantial progress compared to initiatives in the early 2000s. As the nature of the world system is anarchic, states make either individual or group efforts to guarantee their economic security and achieve their interests. Based on neoclassical realism, this paper analyzes both internal and external US economic factors driving current and future de-dollarization and the implications on the international monetary system, in addition to examining the motivation for such moves.

Keywords: de-dollarization, US dollar, monetary system, economic security, economic policies.

Procedia PDF Downloads 92
16554 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability

Authors: Özlem Turan, Şule Turhan

Abstract:

About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.

Keywords: food, food safety, food systems, sustainability

Procedia PDF Downloads 386
16553 A Review on Bioremediation of Waste Effluent Associated with Pulp and Paper Industry

Authors: Adamu Muhammed Tukur

Abstract:

Pulp and paper industry is one of the fastest growing industries due to an increased demand in paper products. For it to satisfy this ever increasing demand, it adopts new technological innovations some of which are proved to affect our environment negatively. Global consumption of paper has increased by 400% in the last four decades and this suggests that more research is required to assess the impact of industrial effluents to our environment and public health. Paper products are generally biodegradable, however, the processes involved in its production which involve the use of mainly bleaching agents and other non-biodegradable substances pose serious problem to the environment. There are more than 250 chemicals released in paper mill waste and some are xenobiotics. Different methods such as physical and chemical methods can be adopted for the remediation of the effluents but are proved to be costly and not safe to the environment. On the other hand, biological method is shown to be less costly and environmentally friendly. Microorganisms and their enzymes have shown a promising future for bioremediation of effluents related to paper mill. Many studies prove that one of the major pollutants in the paper mill effluent is phenol especially its chlorinated derivatives. Pentachlorophenol is extremely hazardous to living cells and therefore need to be removed from the environment. Microorganisms including bacteria and fungi have the potential to degrade phenolic compounds e.g. Bacillus stearothermiphilus, Pseudomonas putida, Coricus versicolor, Sphingomonas chlorophenolica, Fusarium sp, Bacillus subtilis and P. aeroginosa. Enzymes used for the degradation include phenol hydrooxylase, polyphenoloxylase, laccase, peroxidase among others. Lignin is another important pollutant and is resistant to microbial degradation but it has been proved that certain bacteria and fungi like can degrade it. Among the fungi white-rot fungi like Fomes lividus and Trametes vesicolor are the most important bioremediators. This review focused on use of microorganism to reduce or eradicate pollutants released from the paper industry. It can serve as a review for further research to be conducted especially in the field of Biotechnology.

Keywords: bioremediation, pulp and paper, pentachlorophenol, environment

Procedia PDF Downloads 326
16552 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 454
16551 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 316
16550 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria

Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim

Abstract:

Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.

Keywords: good quality of water, water accessibility, water availability, water sustainable

Procedia PDF Downloads 528
16549 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 387
16548 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 44
16547 Automated Monitoring System to Support Investigation of Contributing Factors of Work-Related Disorders and Accidents

Authors: Erika R. Chambriard, Sandro C. Izidoro, Davidson P. Mendes, Douglas E. V. Pires

Abstract:

Work-related illnesses and disorders have been a constant aspect of work. Although their nature has changed over time, from musculoskeletal disorders to illnesses related to psychosocial aspects of work, its impact on the life of workers remains significant. Despite significant efforts worldwide to protect workers, the disparity between changes in work legislation and actual benefit for workers’ health has been creating a significant economic burden for social security and health systems around the world. In this context, this study aims to propose, test and validate a modular prototype that allows for work environmental aspects to be assessed, monitored and better controlled. The main focus is also to provide a historical record of working conditions and the means for workers to obtain comprehensible and useful information regarding their work environment and legal limits of occupational exposure to different types of environmental variables, as means to improve prevention of work-related accidents and disorders. We show the developed prototype provides useful and accurate information regarding the work environmental conditions, validating them with standard occupational hygiene equipment. We believe the proposed prototype is a cost-effective and adequate approach to work environment monitoring that could help elucidate the links between work and occupational illnesses, and that different industry sectors, as well as developing countries, could benefit from its capabilities.

Keywords: Arduino prototyping, occupational health and hygiene, work environment, work-related disorders prevention

Procedia PDF Downloads 126
16546 Non-factoid Arabic Question-Answering Systems: A Review of Existing Studies, Research Issues, and Future Trends

Authors: Aya Mousa, Mahmoud Alsaheb

Abstract:

Question Answering System (QAS) aims to provide the most suitable answer to the user's question in any natural language. In the recent future, it will be a future version of web search. Much research has already been done on answering Arabic factoid questions and achieved good accuracy. In contrast, the progress in research on Arabic non-factoid question answering is still immature. In this survey, we summarize, discuss, and compare the existing Arab non-factoid question-answering systems to identify the limitations and the achievements that were accomplished. Furthermore, we investigate the challenges in developing non-factoid Arabic QAS and the possible future improvements. The survey is written to help the researchers to understand the field of Arabic non-factoid QAS and to motivate them to utilize different approaches to develop and enhance the Non-factoid Arabic QAS

Keywords: Arabic question answering system, non-factoid question answering, Arabic NLP, question answering

Procedia PDF Downloads 100
16545 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 453