Search results for: European security
3651 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria
Authors: Albert T. Akume, Yahya M. Abdullahi
Abstract:
The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development
Procedia PDF Downloads 4993650 The Impacts of Cultural Event on Networking: Liverpool's Cultural Sector in the Aftermath of 2008
Authors: Yi-De Liu
Abstract:
The aim of this paper is to discuss how the construct of networking and social capital can be used to understand the effect events can have on the cultural sector. Based on case study, this research sought the views of those working in the cultural sector on Liverpool’s year as the European Capital of Culture (ECOC). Methodologically, this study involves literature review to prompt theoretical sensitivity, the collection of primary data via online survey (n= 42) and follow-up telephone interviews (n= 8) to explore the emerging findings in more detail. The findings point to a number of ways in which the ECOC constitutes a boost for networking and its effects on city’s cultural sector, including organisational learning, aspiration and leadership. The contributions of this study are two-fold: (1) Evaluating the long-term effects on network formation in the cultural sector following major event; (2) conceptualising the impact assessment of organisational social capital for future ECOC or similar events.Keywords: network, social capital, cultural impact, european capital of culture
Procedia PDF Downloads 2053649 Econophysics: The Use of Entropy Measures in Finance
Authors: Muhammad Sheraz, Vasile Preda, Silvia Dedu
Abstract:
Concepts of econophysics are usually used to solve problems related to uncertainty and nonlinear dynamics. In the theory of option pricing the risk neutral probabilities play very important role. The application of entropy in finance can be regarded as the extension of both information entropy and the probability entropy. It can be an important tool in various financial methods such as measure of risk, portfolio selection, option pricing and asset pricing. Gulko applied Entropy Pricing Theory (EPT) for pricing stock options and introduced an alternative framework of Black-Scholes model for pricing European stock option. In this article, we present solutions to maximum entropy problems based on Tsallis, Weighted-Tsallis, Kaniadakis, Weighted-Kaniadakies entropies, to obtain risk-neutral densities. We have also obtained the value of European call and put in this framework.Keywords: option pricing, Black-Scholes model, Tsallis entropy, Kaniadakis entropy, weighted entropy, risk-neutral density
Procedia PDF Downloads 3043648 Upper Jurassic Foraminiferal Assemblages and Palaeoceanographical Changes in the Central Part of the East European Platform
Authors: Clementine Colpaert, Boris L. Nikitenko
Abstract:
The Upper Jurassic foraminiferal assemblages of the East European Platform have been strongly investigated through the 20th century with biostratigraphical and in smaller degree palaeoecological and palaeobiogeographical purposes. Over the Late Jurassic, the platform was a shallow epicontinental sea that extended from Tethys to the Artic through the Pechora Sea and further toward the northeast in the West Siberian Sea. Foraminiferal assemblages of the Russian Sea were strongly affected by sea-level changes and were controlled by alternated Boreal to Peritethyan influences. The central part of the East European Platform displays very rich and diverse foraminiferal assemblages. Two sections have been analyzed; the Makar'yev Section in the Moscow Depression and the Gorodishi Section in the Yl'yanovsk Depression. Based on the evolution of foraminiferal assemblages, palaeoenvironment has been reconstructed, and sea-level changes have been refined. The aim of this study is to understand palaeoceanographical changes throughout the Oxfordian – Kimmeridgian of the central part of the Russian Sea. The Oxfordian was characterized by a general transgressive event with intermittency of small regressive phases. The platform was connected toward the south with Tethys and Peritethys. During the Middle Oxfordian, opening of a pathway of warmer water from the North-Tethys region to the Boreal Realm favoured the migration of planktonic foraminifera and the appearance of new benthic taxa. It is associated with increased temperature and primary production. During the Late Oxfordian, colder water inputs associated with the microbenthic community crisis may be a response to the closure of this warm-water corridor and the disappearance of planktonic foraminifera. The microbenthic community crisis is probably due to the increased sedimentation rate in the transition from the maximum flooding surface to a second-order regressive event, increasing productivity and inputs of organic matter along with sharp decrease of oxygen into the sediment. It is following during the Early Kimmeridgian by a replacement of foraminiferal assemblages. The almost all Kimmeridgian is characterized by the abundance of many common with Boreal and Subboreal Realm. Connections toward the South began again dominant after a small regressive event recorded during the Late Kimmeridgian and associated with the abundance of many common taxa with Subboreal Realm and Peritethys such as Crimea and Caucasus taxa. Foraminiferal assemblages of the East European Platform are strongly affected by palaeoecological changes and may display a very good model for biofacies typification under Boreal and Subboreal environments. The East European Platform appears to be a key area for the understanding of Upper Jurassic big scale palaeoceanographical changes, being connected with Boreal to Peritethyan basins.Keywords: foraminifera, palaeoceanography, palaeoecology, upper jurassic
Procedia PDF Downloads 2483647 Does Supervisory Board Composition Influence Sustainability Reporting Quality?
Authors: Patrick Velte
Abstract:
Sustainability reporting has become a central element of modern corporate governance practice. This paper is the first to recognize supervisory board independence, sustainable expertise and gender diversity in two European two tier countries and their impact on sustainability reporting quality. For a sample of 188 German and Austrian companies which are listed at the Prime Standard of the Frankfurt and Vienna Stock Exchange for the business years 2012-2013, descriptive findings show that CSR reporting quality is still low in both countries. Furthermore, multiple regressions state that independent and female members in the supervisory board do have a positive impact on CSR reporting quality in Germany and Austria. However, the existence of sustainable experts in the supervisory board both in Germany and Austria shows a positive but insignificant impact. Our findings suggest that the current European corporate governance regulations can be a useful instrument to increase the quality of modern CSR reporting for the stakeholders.Keywords: sustainability reporting, corporate governance, gender diversity, board independence
Procedia PDF Downloads 3983646 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province
Authors: Sakapas Saengchai
Abstract:
A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.Keywords: security, border trade, customs, participation, people
Procedia PDF Downloads 1833645 Energy Security and Sustainable Development: Challenges and Prospects
Authors: Abhimanyu Behera
Abstract:
Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.Keywords: energy, policies, security, sustainability
Procedia PDF Downloads 3903644 Corporate Social Responsibility a Comparison between European and Latin American Companies
Authors: Eva Wagner, Lucely Vargas
Abstract:
Corporate Social Responsibility (CSR) plays an important role in (large-scale) enterprises’ business strategy in developed and emerging countries. This article approaches CSR in international comparison by examining the CSR reporting of 116 leading companies in Austria, Germany, Colombia and Chile from 2006 to 2010. We have used an independently developed scoring model which analyzes reported CSR-activities using seven dimensions to efficiently assess CSR. The study reveals that there are significant differences in CSR-commitment among countries and regions: German companies, as expected, lead most of the investigated CSR dimensions revealing stronger commitment to CSR than their Austrian, Colombian and Chilean counterparts. Even if Latin American companies lag behind their European counterparts, they exhibit high CSR-performance in the social dimension: corporate giving and philanthropic activities are firmly anchored in the tradition of Latin American companies. This indicates that particular CSR-emphases reflect the political and social circumstances of each individual country.Keywords: corporate social responsibility, corporate social performance, international comparison
Procedia PDF Downloads 3193643 Possibilities and Prospects for the Development of the Agricultural Insurance Market (The Example of Georgia)
Authors: Nino Damenia
Abstract:
The agricultural sector plays an important role in the development of Georgia's economy, it contributes to employment and food security. It faces various types of risks that may lead to heavy financial losses. Agricultural insurance is one of the means of combating agricultural risks. The paper discusses the agricultural insurance experience of those countries (European countries and the USA) that have successfully implemented the agricultural insurance program. Analysis of international cases shows that a well-designed and implemented agri-insurance system can bring significant benefits to farmers, insurance companies and the economy as a whole. In the background of all this, the Government of Georgia recognized the importance of agro-insurance and took important steps for its development. In 2014, in cooperation with insurance companies, an agro-insurance program was introduced, the purpose of which is to increase the availability of insurance for farmers and stimulate the agro-insurance market. Despite such a step forward, challenges remain such as awareness of farmers, insufficient infrastructure for data collection and risk assessment, involvement of insurance companies and other important factors. With the support of the government and stakeholders, it is possible to overcome the existing challenges and establish a strong and effective agro-insurance system. Objectives. The purpose of the research is to analyze the development trends of the agricultural insurance market, to identify the main factors affecting its growth, and to further develop recommendations for development prospects for Georgia. Methodologies. The research uses mixed methods, which combine qualitative and quantitative research techniques. The qualitative method includes the study of the literature of Georgian and foreign economists, which allows us to get acquainted with the challenges, opportunities, legislative and regulatory frameworks of agricultural insurance. Quantitative analysis involves collecting data from stakeholders and then analyzing it. The paper also uses the methods of synthesis, comparison and statistical analysis of the agricultural insurance market in Georgia, Europe and the USA. Conclusions. As the main results of the research, we can consider that the analysis of the insurance market has been made and its main functions have been identified; The essence, features and functions of agricultural insurance are analyzed; European and US agricultural insurance market is researched; The stages of formation and development of the agricultural insurance market of Georgia are studied, its importance for the agricultural sector of Georgia is determined; The role of the state for the development of agro-insurance is analyzed and development prospects are established based on the study of the current trends of the agro-insurance market of Georgia.Keywords: agricultural insurance, agriculture, agricultural insurance program, risk
Procedia PDF Downloads 623642 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1543641 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 423640 A Review on Factors Influencing Implementation of Secure Software Development Practices
Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin
Abstract:
More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.Keywords: secure software development, software development, software security, systematic literature review
Procedia PDF Downloads 3813639 Learning-by-Heart vs. Learning by Thinking: Fostering Thinking in Foreign Language Learning A Comparison of Two Approaches
Authors: Danijela Vranješ, Nataša Vukajlović
Abstract:
Turning to learner-centered teaching instead of the teacher-centered approach brought a whole new perspective into the process of teaching and learning and set a new goal for improving the educational process itself. However, recently a tremendous decline in students’ performance on various standardized tests can be observed, above all on the PISA-test. The learner-centeredness on its own is not enough anymore: the students’ ability to think is deteriorating. Especially in foreign language learning, one can encounter a lot of learning by heart: whether it is grammar or vocabulary, teachers often seem to judge the students’ success merely on how well they can recall a specific word, phrase, or grammar rule, but they rarely aim to foster their ability to think. Convinced that foreign language teaching can do both, this research aims to discover how two different approaches to teaching foreign language foster the students’ ability to think as well as to what degree they help students get to the state-determined level of foreign language at the end of the semester as defined in the Common European Framework. For this purpose, two different curricula were developed: one is a traditional, learner-centered foreign language curriculum that aims at teaching the four competences as defined in the Common European Framework and serves as a control variable, whereas the second one has been enriched with various thinking routines and aims at teaching the foreign language as a means to communicate ideas and thoughts rather than reducing it to the four competences. Moreover, two types of tests were created for each approach, each based on the content taught during the semester. One aims to test the students’ competences as defined in the CER, and the other aims to test the ability of students to draw on the knowledge gained and come to their own conclusions based on the content taught during the semester. As it is an ongoing study, the results are yet to be interpreted.Keywords: common european framework of reference, foreign language learning, foreign language teaching, testing and assignment
Procedia PDF Downloads 1083638 Brazilian Public Security: Governability and Constitutional Change
Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari
Abstract:
Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.Keywords: public security, governability, rule of law, federalism
Procedia PDF Downloads 6783637 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 2673636 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century
Authors: Stephen L. Roberts
Abstract:
This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.Keywords: algorithms, global health, pandemic, surveillance
Procedia PDF Downloads 1873635 Women and Food Security: Evidence from Bangladesh Demographic Health Survey 2011
Authors: Abdullah Al. Morshed, Mohammad Nahid Mia
Abstract:
Introduction: Food security refers to the availability of food and a person’s access to it. It is a complex sustainable development issue, which is closely related to under-nutrition. Food security, in turn, can widely affect the living standard, and is rooted in poverty and leads to poor health, low productivity, low income, food shortage, and hunger. The study's aim was to identify the most vulnerable women who are in insecure positions. Method: 17,842 married women were selected for analysis from the Bangladesh Demographic and Health Survey 2011. Food security defined as dichotomous variables of skipped meals and eaten less food at least once in the last year. The outcome variables were cross-tabulated with women's socio-demographic characteristics and chi2 test was applied to see the significance. Logistic regression models were applied to identify the most vulnerable groups in terms of food security. Result: Only 18.5% of women said that they ever had to skip meals in the last year. 45.7% women from low socioeconomic status had skip meal for at least once whereas only 3.6% were from women with highest socioeconomic status. Women meal skipping was ranged from 1.4% to 34.2% by their educational status. 22% of women were eaten less food during the last year. The rate was higher among the poorest (51.6%), illiterate (39.9%) and household have no electricity connection (38.1) in compared with richest (4.4%), higher educated (2.0%), and household has electricity connection (14.0%). The logistic regression analysis indicated that household socioeconomic status, and women education show strong gradients to skip meals. Poorest have had higher odds (20.9) than richest and illiterate women had 7.7 higher odds than higher educated. In terms of religion, Christianity was 2.3 times more likely to skip their meals than Islam. On the other hand, a similar trend was observed in our other outcome variable eat less food. Conclusion: In this study we able to identify women with lower economics status and women with no education were mostly suffered group from starvation.Keywords: food security, hunger, under-nutrition, women
Procedia PDF Downloads 3743634 Optimal Hedging of a Portfolio of European Options in an Extended Binomial Model under Proportional Transaction Costs
Authors: Norm Josephy, Lucy Kimball, Victoria Steblovskaya
Abstract:
Hedging of a portfolio of European options under proportional transaction costs is considered. Our discrete time financial market model extends the binomial market model with transaction costs to the case where the underlying stock price ratios are distributed over a bounded interval rather than over a two-point set. An optimal hedging strategy is chosen from a set of admissible non-self-financing hedging strategies. Our approach to optimal hedging of a portfolio of options is based on theoretical foundation that includes determination of a no-arbitrage option price interval as well as on properties of the non-self-financing strategies and their residuals. A computational algorithm for optimizing an investor relevant criterion over the set of admissible non-self-financing hedging strategies is developed. Applicability of our approach is demonstrated using both simulated data and real market data.Keywords: extended binomial model, non-self-financing hedging, optimization, proportional transaction costs
Procedia PDF Downloads 2523633 Housing Practices of the Young Southern Europeans in Connection with Family Strategies during the Crisis
Authors: Myrto Dagkouli-Kyriakoglou
Abstract:
Southern European countries tend to have a lot of connections in their culture, customs, ideals and attitude towards everyday aspects. On the contrary, all of them demonstrate a lot of differences in their history, political life and economic situation. Nevertheless, the state welfare and its insufficiency to deal with citizens’ needs, is common for the whole region. As the global financial crisis initiated, all of them gradually were affected and established austerity measures. Consequently, there were crucial budget cuts in state welfare and accordingly limited support to the citizens at a time that is most needed as the economic difficulties of the households are rising rapidly. Crisis in connection with austerity measures brought up a housing problem which was hidden for decades with the assistance of the institution of the Southern European family. New or old copying practices concerning housing are already developed and more will rise in order to survive this new era. Expressly, youth is one of the most vulnerable groups in this situation and therefore there is a special focus on the policies that affect their housing as well as their copying practices in connection with the family/kinship strategies.Keywords: housing, coping practices, Greece, familism
Procedia PDF Downloads 3483632 Investigating of the Fuel Consumption in Construction Machinery and Ways to Reduce Fuel Consumption
Authors: Reza Bahboodian
Abstract:
One of the most important factors in the use of construction machinery is the fuel consumption cost of this equipment. The use of diesel engines in off-road vehicles is an important source of nitrogen oxides and particulate matter. Emissions of nitrogen oxides and particulate matter 10 in off-road vehicles (construction and mining) may be high. Due to the high cost of fuel, it is necessary to minimize fuel consumption. Factors affecting the fuel consumption of these cars are very diverse. Climate changes such as changes in pressure, temperature, humidity, fuel type selection, type of gearbox used in the car are effective in fuel consumption and pollution, and engine efficiency. In this paper, methods for reducing fuel consumption and pollutants by considering valid European and European standards are examined based on new methods such as hybridization, optimal gear change, adding hydrogen to diesel fuel, determining optimal working fluids, and using oxidation catalysts.Keywords: improve fuel consumption, construction machinery, pollutant reduction, determining the optimal working cycle
Procedia PDF Downloads 1633631 Sorghum Resilience and Sustainability under Limiting and Non-limiting Conditions of Water and Nitrogen
Authors: Muhammad Tanveer Altaf, Mehmet Bedir, Waqas Liaqat, Gönül Cömertpay, Volkan Çatalkaya, Celaluddin Barutçular, Nergiz Çoban, Ibrahim Cerit, Muhammad Azhar Nadeem, Tolga Karaköy, Faheem Shehzad Baloch
Abstract:
Food production needs to be almost double by 2050 in order to feed around 9 billion people around the Globe. Plant production mostly relies on fertilizers, which also have one of the main roles in environmental pollution. In addition to this, climatic conditions are unpredictable, and the earth is expected to face severe drought conditions in the future. Therefore, water and fertilizers, especially nitrogen are considered as main constraints for future food security. To face these challenges, developing integrative approaches for germplasm characterization and selecting the resilient genotypes performing under limiting conditions is very crucial for effective breeding to meet the food requirement under climatic change scenarios. This study is part of the European Research Area Network (ERANET) project for the characterization of the diversity panel of 172 sorghum accessions and six hybrids as control cultivars under limiting (+N/-H2O, -N/+H2O) and non-limiting conditions (+N+H2O). This study was planned to characterize the sorghum diversity in relation to resource Use Efficiency (RUE), with special attention on harnessing the interaction between genotype and environment (GxE) from a physiological and agronomic perspective. Experiments were conducted at Adana, a Mediterranean climate, with augmented design, and data on various agronomic and physiological parameters were recorded. Plentiful diversity was observed in the sorghum diversity panel and significant variations were seen among the limiting water and nitrogen conditions in comparison with the control experiment. Potential genotypes with the best performance are identified under limiting conditions. Whole genome resequencing was performed for whole germplasm under investigation for diversity analysis. GWAS analysis will be performed using genotypic and phenotypic data and linked markers will be identified. The results of this study will show the adaptation and improvement of sorghum under climate change conditions for future food security.Keywords: germplasm, sorghum, drought, nitrogen, resources use efficiency, sequencing
Procedia PDF Downloads 783630 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments
Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek
Abstract:
Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking
Procedia PDF Downloads 2893629 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 3813628 Long-Term Modal Changes in International Traffic - Example of the Polish Eastern Border
Authors: Tomasz Komornicki
Abstract:
The possibilities of cross-border traffic depend on the degree of permeability of a given border as well as the state of the existing transport infrastructure. The aim of this paper is to identify the impact of economic transformation, EU accession, and infrastructure development on modal shifts in border traffic through the Polish eastern boundary. In the 1980s railway was still the main mode of cross-border transport in Poland. At the beginning of the 1990s, the role of the road and rail transborder passenger traffic was similar, but since 1993, the role of rail was decreasing. The general decline in rail infrastructure in Poland continued uninterruptedly until accession to the European Union. The slow opposite trend can be observed later as a result of the inflow of European funds. In the countries neighbouring Poland from the east, these processes took place with some delay, and the loss of railway position was not so drastic. Therefore, cross-border railway connections have been maintained for quite a long time since the break-up of the USSR. However, finally, cross-border rail transport proved to be completely inflexible in relation to both economic, geopolitical, and transport transformations. It has been shown that the current modal split of the passenger border traffic was shaped by the following factors: a) closure of many transborder railway lines, especially local ones; b) the signing of an agreement on minor border traffic with Ukraine; c) rapidly growing number of citizens of Ukraine working in Poland (unofficial transportation of workers by car directly to their workplaces in Poland); d) the emergence of low-cost air connections between Ukraine and Poland and the growing role of air transport in the Russia-Poland relationship. The summary points to the possibility of a renewed increase in the importance of rail transport on the eastern border of the European Union.Keywords: modal change, border, rail transport, Poland
Procedia PDF Downloads 2003627 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project
Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth
Abstract:
Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security
Procedia PDF Downloads 4373626 Mobile Payment over NFC: The M-Check System Case
Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich
Abstract:
The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.Keywords: M-payment, NFC, M-check, M-commerce, security
Procedia PDF Downloads 5983625 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions
Authors: Siddharth Krishnaswamy
Abstract:
Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.Keywords: analysis, food security indicators, response, resilience analysis
Procedia PDF Downloads 3323624 Britain and the EU Referendum: Arguments over East European Welfare Benefit Tourism
Authors: James Moir
Abstract:
This paper considers the political controversy in Britain, both pre- and post-EU referendum, concerning claims over welfare benefit tourism and immigration in the UK. These claims were seen to be a significant reason for the vote for Brexit despite evidence to the contrary that benefit tourism was not, and is not, implicated in the migration of East Europeans to the UK. Populist rhetoric is analysed alongside studies that contradict such views. These contentious issues are examined with respect to the agenda set by the United Kingdom Independence Party (UKIP) concerning anti-EU and anti-immigrant sentiment and the notion of cultural differences as the basis for supporting Brexit. The paper also examines the paradoxical claim that East European migrants are taking British jobs and driving down wages. Taken together, it is argued that these two kinds of claims effectively contribute to anti-immigration discourse based on the logic of economics, but also at the same time conceal more irrational fears of adapting to change through the inclusion of others. Such fears are considered as being founded upon a challenge to the stability of totems of national life and identity.Keywords: benefits, Brexit, immigration, tourism, welfare
Procedia PDF Downloads 3813623 Inclusive Business and Its Contribution to Farmers Wellbeing in Arsi Ethiopia: Empirical Evidence
Authors: Senait G. Worku, Ellen Mangnus
Abstract:
Inclusive business models which integrates low-income people with companies value chain in a commercially viable way has gained momentum for the perceived potential to contribute to poverty alleviation and food security in developing countries. This article investigates the impact of Community Revenue Enhancement through Technology Extension (CREATE) project of Heineken brewery on smallholder farmers’ wellbeing in Arsi zone Oromia regional state of Ethiopia. CREATE is a Public-Private Partnership (PPP) between Ministry of Foreign Affairs of the Netherlands and Heineken N.V. which source malt barely from smallholder farmers in three zones of Oromia. The study assessed the impact of CREATE on malt barley productivity, food security and new asset purchase in Arsi zone by comparing households that participate in the project with non-participating households using propensity score matching method. The finding indicated that households that participated in the CREATE project had higher malt barley productivity and purchased more new assets than non-participating households. However, there is no significant difference on food security status of participating and non-participating households indicating that the project has a profound impact on asset accumulation than on food security improvement.Keywords: inclusive business, malt barley, propensity score matching, wellbeing
Procedia PDF Downloads 1563622 Password Cracking on Graphics Processing Unit Based Systems
Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik
Abstract:
Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.Keywords: GPGPU, password cracking, secret key, user authentication
Procedia PDF Downloads 291