Search results for: social security schemes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12031

Search results for: social security schemes

11311 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 175
11310 The Effects of an Immigration Policy on the Economic Integration of Migrants and on Natives’ Attitudes: The Case of Syrian Refugees in Turkey

Authors: S. Zeynep Siretioglu Girgin, Gizem Turna Cebeci

Abstract:

Turkey’s immigration policy is a controversial issue considering its legal, economic, social, and political and human rights dimensions. Formulation of an immigration policy goes hand in hand with political processes, where natives’ attitudes play a significant role. On the other hand, as was the case in Turkey, radical changes made in immigration policy or policies lacking transparency may cause severe reactions by the host society. The underlying discussion paper aims to analyze quantitatively the effects of the existing ‘open door’ immigration policy on the economic integration of Syrian refugees in Turkey, and on the perception of the native population of refugees. For the analysis, semi-structured in-depth interviews and focus group interviews have been conducted. After the introduction, a literature review is provided, followed by theoretical background on the explanation of natives’ attitudes towards immigrants. In the next section, a qualitative analysis of natives’ attitudes towards Syrian refugees is presented with the subtopics of (i) awareness, general opinions and expectations, (ii) open-door policy and management of the migration process, (iii) perception of positive and negative impacts of immigration, (iv) economic integration, and (v) cultural similarity. Results indicate that, natives concurrently have social, economic and security concerns regarding refugees, while difficulties regarding security and economic integration of refugees stand out. Socio-economic characteristics of the respondents, such as the educational level and employment status, are not sufficient to explain the overall attitudes towards refugees, while they can be used to explain the awareness of the respondents and the priority of the concerns felt.

Keywords: economic integration, immigration policy, integration policies, migrants, natives’ sentiments, perception, Syrian refugees, Turkey

Procedia PDF Downloads 352
11309 Evaluation of Different Fertilization Practices and Their Impacts on Soil Chemical and Microbial Properties in Two Agroecological Zones of Ghana

Authors: Ansong Richard Omari, Yosei Oikawa, Yoshiharu Fujii, Dorothea Sonoko Bellingrath-Kimura

Abstract:

Renewed interest in soil management aimed at improving the productive capacity of Sub Saharan Africa (SSA) soils has called for the need to analyse the long term effect of different fertilization systems on soil. This study was conducted in two agroecological zones (i.e., Guinea Savannah (GS) and Deciduous forest (DF)) of Ghana to evaluate the impacts of long term (> 5 years) fertilization schemes on soil chemical and microbial properties. Soil samples under four different fertilization schemes (inorganic, inorganic and organic, organic, and no fertilization) were collected from 20 farmers` field in both agroecological zones. Soil analyses were conducted using standard procedures. All average soil quality parameters except extractable C, potential mineralizable nitrogen and CEC were significantly higher in DF sites compared to GS. Inorganic fertilization proved superior in soil chemical and microbial biomass especially in GS zone. In GS, soil deterioration index (DI) revealed that soil quality deteriorated significantly (−26%) under only organic fertilization system whereas soil improvement was observed under inorganic and no fertilization sites. In DF, either inorganic or organic and inorganic fertilization showed significant positive effects on soil quality. The high soil chemical composition and enhanced microbial biomass in DF were associated with the high rate of inorganic fertilization.

Keywords: deterioration index, fertilization scheme, microbial biomass, tropical agroecological zone

Procedia PDF Downloads 398
11308 Computer Aide Discrimination of Benign and Malignant Thyroid Nodules by Ultrasound Imaging

Authors: Akbar Gharbali, Ali Abbasian Ardekani, Afshin Mohammadi

Abstract:

Introduction: Thyroid nodules have an incidence of 33-68% in the general population. More than 5-15% of these nodules are malignant. Early detection and treatment of thyroid nodules increase the cure rate and provide optimal treatment. Between the medical imaging methods, Ultrasound is the chosen imaging technique for assessment of thyroid nodules. The confirming of the diagnosis usually demands repeated fine-needle aspiration biopsy (FNAB). So, current management has morbidity and non-zero mortality. Objective: To explore diagnostic potential of automatic texture analysis (TA) methods in differentiation benign and malignant thyroid nodules by ultrasound imaging in order to help for reliable diagnosis and monitoring of the thyroid nodules in their early stages with no need biopsy. Material and Methods: The thyroid US image database consists of 70 patients (26 benign and 44 malignant) which were reported by Radiologist and proven by the biopsy. Two slices per patient were loaded in Mazda Software version 4.6 for automatic texture analysis. Regions of interests (ROIs) were defined within the abnormal part of the thyroid nodules ultrasound images. Gray levels within an ROI normalized according to three normalization schemes: N1: default or original gray levels, N2: +/- 3 Sigma or dynamic intensity limited to µ+/- 3σ, and N3: present intensity limited to 1% - 99%. Up to 270 multiscale texture features parameters per ROIs per each normalization schemes were computed from well-known statistical methods employed in Mazda software. From the statistical point of view, all calculated texture features parameters are not useful for texture analysis. So, the features based on maximum Fisher coefficient and the minimum probability of classification error and average correlation coefficients (POE+ACC) eliminated to 10 best and most effective features per normalization schemes. We analyze this feature under two standardization states (standard (S) and non-standard (NS)) with Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Non-Linear Discriminant Analysis (NDA). The 1NN classifier was performed to distinguish between benign and malignant tumors. The confusion matrix and Receiver operating characteristic (ROC) curve analysis were used for the formulation of more reliable criteria of the performance of employed texture analysis methods. Results: The results demonstrated the influence of the normalization schemes and reduction methods on the effectiveness of the obtained features as a descriptor on discrimination power and classification results. The selected subset features under 1%-99% normalization, POE+ACC reduction and NDA texture analysis yielded a high discrimination performance with the area under the ROC curve (Az) of 0.9722, in distinguishing Benign from Malignant Thyroid Nodules which correspond to sensitivity of 94.45%, specificity of 100%, and accuracy of 97.14%. Conclusions: Our results indicate computer-aided diagnosis is a reliable method, and can provide useful information to help radiologists in the detection and classification of benign and malignant thyroid nodules.

Keywords: ultrasound imaging, thyroid nodules, computer aided diagnosis, texture analysis, PCA, LDA, NDA

Procedia PDF Downloads 272
11307 Countering Violent Extremism: Challenges and Possibilities for Muslim Ummah

Authors: Altaf Ahmed

Abstract:

Unhindered progress and advancement of life are directly associated with peace and development. Unfortunately, many modern states are prone to the perilous of social challenges; Violent Extremism is the most ubiquitous adversary among all. Islam in its origin fully supports peace and security; the charter of Madina, the treaty of Hudabia and conquer of Mecca are the biggest examples in this reference. The holy Prophet Muhammad ﷺ always gave priority to peace in these cases. Today, the majority of the Muslim World faces VE and terrorism due to multiple reasons ranging from religious interpretations to political, social and economic conditions. This research will try to explore challenges for Muslim Ummah in maintaining peace and what steps have been taken by it to resolve conflicts among states. In this context, Sustainable development goals (SDGs) will be particularly analysed. SDGs were adopted by all United Nations Member States in 2015. It is an undeniable fact that these are the best peace-building tools. Although there are 17 SDGs, the paper will mainly focus on quality education, zero hunger, end of poverty (social protection), women empowerment, reduced inequalities and economic growth as the best peace-building approaches for eradication of violent extremism.

Keywords: violent extremism, Muslim Ummah, peace, modern world, education

Procedia PDF Downloads 109
11306 Use of Galileo Advanced Features in Maritime Domain

Authors: Olivier Chaigneau, Damianos Oikonomidis, Marie-Cecile Delmas

Abstract:

GAMBAS (Galileo Advanced features for the Maritime domain: Breakthrough Applications for Safety and security) is a project funded by the European Space Program Agency (EUSPA) aiming at identifying the search-and-rescue and ship security alert system needs for maritime users (including operators and fishing stakeholders) and developing operational concepts to answer these needs. The general objective of the GAMBAS project is to support the deployment of Galileo exclusive features in the maritime domain in order to improve safety and security at sea, detection of illegal activities and associated surveillance means, resilience to natural and human-induced emergency situations, and develop, integrate, demonstrate, standardize and disseminate these new associated capabilities. The project aims to demonstrate: improvement of the SAR (Search And Rescue) and SSAS (Ship Security Alert System) detection and response to maritime distress through the integration of new features into the beacon for SSAS in terms of cost optimization, user-friendly aspects, integration of Galileo and OS NMA (Open Service Navigation Message Authentication) reception for improved authenticated localization performance and reliability, and at sea triggering capabilities, optimization of the responsiveness of RCCs (Rescue Co-ordination Centre) towards the distress situations affecting vessels, the adaptation of the MCCs (Mission Control Center) and MEOLUT (Medium Earth Orbit Local User Terminal) to the data distribution of SSAS alerts.

Keywords: Galileo new advanced features, maritime, safety, security

Procedia PDF Downloads 88
11305 “Japan’s New Security Outlook: Implications for the US-Japan Alliance”

Authors: Agustin Maciel-Padilla

Abstract:

This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years.

Keywords: us-japan alliance, japan security, great power competition, interoperability

Procedia PDF Downloads 60
11304 Averting Food Crisis in Nigeria and Beyond, Activities of the National Food Security Programme

Authors: Musa M. Umar, S. G. Ado

Abstract:

The paper examines the activities of the National Programme for food security (NPFS) for averting food insecurity in Nigeria and beyond. The components of the NPFS include site development, outreach, community development and management support. On each site, core activities comprise crop productivity, production diversification and agro-processing. The outreach activities consist of inputs and commodity marketing, rural finance, strengthening research-extension-farmers-inputs linkages, health and nutrition and expansion of site activities. The community development activities include small-scale rural infrastructure, micro-earth dams and community forestry. The overall benefits include food security, improved productivity, marketing and processing, enhanced land and water use, increased animal production and fish catches, improved nutrition, reduction in post-harvest losses and value addition, improved rural infrastructure and diversification of production leading to improved livelihood. The NPFS would poster sustained development of small-holder agricultural and income generation.

Keywords: food-security, community development, post-harvest, production

Procedia PDF Downloads 350
11303 Identity Conflict between Social and Business Entrepreneurs: The Challenge of Constructing a Novel Social Identity

Authors: Rui G. Serôdio, Carina Martins, Alexandra Serra, José A. Lima, Luísa Catita, Paula Lopes

Abstract:

Building on social identity approach, we tested the impact of social categorization and comparison in the psychosocial process by which social entrepreneurs define their group identity. Specifically, we address how both differentiation and assimilation processes are set of in the context of constructing a novel, distinctive and socially salient – social entrepreneurs. As part of a larger research line, a quasi-experimental study with Social and Business Entrepreneurs, as well as “Lay People” provided evidence consistent with our predictions: (1) Social Entrepreneurs, in contrast with Lay People and Business Entrepreneurs, value more strongly social identity than personal identity, and the later is the only group that values Personal Differentiation; (2) unlike Entrepreneurs, Social Entrepreneurs display an ingroup bias across group evaluations; (3) Lay People, display a self-serving bias, although, overall, they allocate a more positive image to the target groups; (4) combining own vs. others evaluations across all groups, Social Entrepreneurs receive the more positive value. From the standpoint of social identity and self-categorization theories and their approach to group process, we discuss the processes of intergroup comparison and differentiation as core processes in the construction of a positive social identity. We illustrate it within the context of social entrepreneurship, a political and social “wave” that flows across Europe at this time.

Keywords: group processes, social entrepreneurship, social identity, business entrepreneurs

Procedia PDF Downloads 687
11302 Risk Management and Security Practice in Customs Supply Chain: Application of Cross ABC Method to the Moroccan Customs

Authors: Lamia Hammadi, Abdellah Ait Ouhman, Aomar Ibourk

Abstract:

It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.

Keywords: cross ABC method, customs supply chain, risk, risk management

Procedia PDF Downloads 368
11301 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 263
11300 Science of Social Work: Recognizing Its Existence as a Scientific Discipline by a Method Triangulation

Authors: Sandra Mendes

Abstract:

Social Work has encountered over time with multivariate requests in the field of its action, provisioning frameworks of knowledge and praxis. Over the years, we have observed a transformation of society and, consequently, of the public who deals with the social work practitioners. Both, training and profession have had need to adapt and readapt the ways of doing, bailing up theories to action, while action unfolds emancipation of new theories. The theoretical questioning of this subject lies on classical authors from social sciences, and contemporary authors of Social Work. In fact, both enhance, in the design of social work, an integration and social cohesion function, creating a culture of action and theory, attributing to its method a relevant function, which shall be promoter of social changes in various dimensions of both individual and collective life, as well as scientific knowledge. On the other hand, it is assumed that Social Work, through its professionalism and through the academy, is now closer to distinguish itself from other Social Sciences as an autonomous scientific field, being, however, in the center of power struggles. This paper seeks to fill the gap in social work literature about the study of the scientific field of this area of knowledge.

Keywords: field theory, knowledge, science, social work

Procedia PDF Downloads 345
11299 Social Media as a Tool for Political Communication: A Case Study of India

Authors: Srikanth Bade

Abstract:

This paper discusses how the usage of social media has altered certain discourses and communicated with the political institutions for major actions in Indian scenario. The advent of new technology in the form of social media has engrossed the general public to discuss in the open forum. How they promulgated their ideas into action is captured in this study. Moreover, these discourses happening in the social media is analyzed from certain philosophical traditions by adopting a framework. Hence, this paper analyses the role of social media in political communication and change the political discourse. Also, this paper tries to address the issue that whether the deliberation made through social media had indeed communicated the issue of political matters to the decision making authorities.

Keywords: collective action and social capital, political communication, political discourse, social media

Procedia PDF Downloads 147
11298 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 291
11297 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 310
11296 Research on the Optimization of the Facility Layout of Efficient Cafeterias for Troops

Authors: Qing Zhang, Jiachen Nie, Yujia Wen, Guanyuan Kou, Peng Yu, Kun Xia, Qin Yang, Li Ding

Abstract:

BACKGROUND: A facility layout problem (FLP) is an NP-complete (non-deterministic polynomial) problem, which is hard to obtain an exact optimal solution. FLP has been widely studied in various limited spaces and workflows. For example, cafeterias with many types of equipment for troops cause chaotic processes when dining. OBJECTIVE: This article tried to optimize the layout of troops’ cafeteria and to improve the overall efficiency of the dining process. METHODS: First, the original cafeteria layout design scheme was analyzed from an ergonomic perspective and two new design schemes were generated. Next, three facility layout models were designed, and further simulation was applied to compare the total time and density of troops between each scheme. Last, an experiment of the dining process with video observation and analysis verified the simulation results. RESULTS: In a simulation, the dining time under the second new layout is shortened by 2.25% and 1.89% (p<0.0001, p=0.0001) compared with the other two layouts, while troops-flow density and interference both greatly reduced in the two new layouts. In the experiment, process completing time and the number of interference reduced as well, which verified corresponding simulation results. CONCLUSIONS: Our two new layout schemes are tested to be optimal by a series of simulation and space experiments. In future research, similar approaches could be applied when taking layout-design algorithm calculation into consideration.

Keywords: layout optimization, dining efficiency, troops’ cafeteria, anylogic simulation, field experiment

Procedia PDF Downloads 134
11295 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 430
11294 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency

Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo

Abstract:

Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.

Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods

Procedia PDF Downloads 140
11293 An Affordability Evaluation of Computer-Based Social-Emotional Skills Interventions for School-Aged Children with Autism Spectrum Disorder

Authors: Ezra N. S. Lockhart

Abstract:

The number of children diagnosed with autism spectrum disorder (ASD) has increased approximately 173% during the last decade making ASD the fastest growing developmental disability in the United States. This rise in prevalence rates indeed has an effect on schools. ASD is overwhelmingly the most reported primary special education eligibility category for students accessing special education, at a national average of 61.3%. ASD is regarded as an urgent public health concern at an estimated annual per capita cost of $3.2 million. Furthermore, considering that ASD is a lifelong disorder estimated lifetime per capita cost reach $35 billion. The resources available to special education programs are insufficient to meet the educational needs of the 6.4 million students receiving special educational services. This is especially true given that there has been and continues to be a chronic shortage of fully certified special education teachers for decades. Reports indicate that 81.1% of students with special needs spend 40% or more in general education classrooms. Regardless of whether support is implemented in the special education or general education classroom the resource demand is obvious. Schools are actively seeking to implement low-cost alternatives and budget saving measures in response to this demand. In public school settings, programs such as Applied Behavior Analysis are challenging to implement and fund at $40,000 per student per year. As an alternative, computer-based interventions are inexpensive, less time-consuming to implement, and require minimal teacher or paraprofessional training to administer. Affordability, pricing schemes, availability, and compatibility of computer-based interventions that support social and emotional skill development in individuals with ASD are discussed.

Keywords: affordability, autism spectrum disorder, computer-based intervention, emotional skills, social skills

Procedia PDF Downloads 157
11292 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 782
11291 Understanding the Effect of Fall Armyworm and Integrated Pest Management Practices on the Farm Productivity and Food Security in Malawi

Authors: Innocent Pangapanga, Eric Mungatana

Abstract:

Fall armyworm (FAW) (Spodoptera frugiperda), an invasive lepidopteran pest, has caused substantial yield loss since its first detection in September 2016, thereby threatening the farm productivity food security and poverty reduction initiatives in Malawi. Several stakeholders, including households, have adopted chemical pesticides to control FAW without accounting for its costs on welfare, health and the environment. Thus, this study has used panel data endogenous switching regression model to investigate the impact of FAW and the integrated pest management (IPM) –related practices on-farm productivity and food security. The study finds that FAW substantively reduces farm productivity by seven (7) percent and influences the adoption of IPM –related practices, namely, intercropping, mulching, and agroforestry, by 6 percent, ceteris paribus. Interestingly, multiple adoptions of the IPM -related practices noticeably increase farm productivity by 21 percent. After accounting for potential endogeneity through the endogenous switching regression model, the IPM practices further demonstrate tenfold more improvement on food security, implying the role of the IPM –related practices in containing the effect of FAW at the household level.

Keywords: hunger, invasive fall army worms, integrated pest management practices, farm productivity, endogenous switching regression

Procedia PDF Downloads 128
11290 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism

Authors: Adamu Buba

Abstract:

As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.

Keywords: challenges, security, governance, ecowas, response

Procedia PDF Downloads 246
11289 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 473
11288 Conceptualizing Notions of Poverty in Graduate Social Work Education: Contextualizing the Formation of the ‘Social Worker’ Subjectivity

Authors: Emily Carrothers

Abstract:

This research takes a critical look at the development of the social worker subjectivity, particularly in Canada. Through an interrogation of required graduate course texts, this paper explicates the discursive formation, orientation, and maintenance of the social worker subject and the conceptualizations of poverty in graduate social work education. This research aims to advance understandings of power and ideology in social work graduate texts and formations of particular dominant constructions of poverty and social worker subjectivity. Guiding questions for this inquiry include: What are social workers being oriented to? What are social workers being oriented away from? How is poverty theorized, discussed and/or attached to social location in social work education? And, how are social workers implicated in contesting or reinforcing poverty? Using critical discourse analysis, 6 texts were analyzed with a particular focus on ways in which notions of poverty are discursively represented and ways in which notions of the formation of the social worker were approached. This revealed that discursively underpinning social work in anti-oppressive practice (AOP) can work to reify hierarchal structures of power that orient social workers away from structural poverty reduction strategies and towards punitive interactions with those that experience poverty and multiple forms of marginalization. This highlights that the social worker subjectivity is formed in opposition to the client, with graduate texts constructing the social worker as an expert in client’s lives and experiences even more so than the client.

Keywords: Canada, education, social work, subjectivity

Procedia PDF Downloads 155
11287 Effects of Social Media on Class Layers in Kuwait

Authors: Bashaiar Al-Sanaa

Abstract:

Class has always been a vital distinguishing factor among people within any society. Clear borders between social layers; such as royals, nobles, aristocrats, the bourgeoisie, and working class; have been minimized and blurred due to the advent of social media. Unprecedented access to information has played a significant role in teaching different individuals about the nature of other social layers, hence, allowing for imitation and integration. This study aims to fill the void in research conducted on such topic. The research explores how social media may be slowly but surely dissolving apparent and rigid borderlines of social class. In order to present an overview of the topic, the study surveys individuals in Kuwait to measure how using social media changed their views and style of social class. It also draws a framework through which implications and suggestions for future research may be discussed to better serve the advancement of human communication.

Keywords: class, communication, Kuwait, social media

Procedia PDF Downloads 186
11286 Exposure to Social Media Shared Video-Clips on Irregularities from the 2023 Election in Nigeria and Audience Perception of the Outcome

Authors: Obiakor Casmir Uchenna, Ikegbunam Peter Chierike, Ezeja Perpetual Chisom

Abstract:

Irregularities have been a major feature of the Nigerian political activities since 1999. The rate at which such impunities thrive in the country has made elections grossly unacceptable among the people because the outcomes have never reflected the wish of the masses. Conscious of this, citizens have subscribed to the use of social media in exposing the ugly faces of the country’s elections which have always been against the less privileged. This study is an exploration of the relationship between exposure to social media shared video-clips and the respondents’ perception of the 2023 presidential election in Nigeria. The general objective of the study is to find out what the respondents make of the election as a result of the video-clips shared on different social media platforms showing electoral irregularities. The study adopted survey research method in studying 378 university undergraduates from NAU, COOU and Paul University selected through purposive sampling technique. The study was premised on the theoretical provision of violation of expectation theory. Findings revealed that the respondents are well exposed to different video-clips showing irregularities on the election. It was also found that the respondents have negative perception of the election. It was concluded that electoral umpire, the government in power and the security apparatus violated the respondents’ expectation from the election based on the pre-election promises made to the citizens. It was recommended among others, that Nigeria must strengthen the various institutions responsible for the conduct of elections if violence will not be made the best option for the poor masses.

Keywords: social media shared video-clips, exposure, irregularities, elections, audience perception, outcome

Procedia PDF Downloads 44
11285 The Intersection/Union Region Computation for Drosophila Brain Images Using Encoding Schemes Based on Multi-Core CPUs

Authors: Ming-Yang Guo, Cheng-Xian Wu, Wei-Xiang Chen, Chun-Yuan Lin, Yen-Jen Lin, Ann-Shyn Chiang

Abstract:

With more and more Drosophila Driver and Neuron images, it is an important work to find the similarity relationships among them as the functional inference. There is a general problem that how to find a Drosophila Driver image, which can cover a set of Drosophila Driver/Neuron images. In order to solve this problem, the intersection/union region for a set of images should be computed at first, then a comparison work is used to calculate the similarities between the region and other images. In this paper, three encoding schemes, namely Integer, Boolean, Decimal, are proposed to encode each image as a one-dimensional structure. Then, the intersection/union region from these images can be computed by using the compare operations, Boolean operators and lookup table method. Finally, the comparison work is done as the union region computation, and the similarity score can be calculated by the definition of Tanimoto coefficient. The above methods for the region computation are also implemented in the multi-core CPUs environment with the OpenMP. From the experimental results, in the encoding phase, the performance by the Boolean scheme is the best than that by others; in the region computation phase, the performance by Decimal is the best when the number of images is large. The speedup ratio can achieve 12 based on 16 CPUs. This work was supported by the Ministry of Science and Technology under the grant MOST 106-2221-E-182-070.

Keywords: Drosophila driver image, Drosophila neuron images, intersection/union computation, parallel processing, OpenMP

Procedia PDF Downloads 232
11284 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan

Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed

Abstract:

This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.

Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis

Procedia PDF Downloads 61
11283 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.

Keywords: caliphate, jihad, ASEAN, counterterrorism, social community

Procedia PDF Downloads 224
11282 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 384