Search results for: security measurement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5356

Search results for: security measurement

4606 Absorbed Dose Measurements for Teletherapy Prediction of Superficial Dose Using Halcyon Linear Accelerator

Authors: Raymond Limen Njinga, Adeneye Samuel Olaolu, Akinyode Ojumoola Ajimo

Abstract:

Introduction: Measurement of entrance dose and dose at different depths is essential to avoid overdose and underdose of patients. The aim of this study is to verify the variation in the absorbed dose using a water-equivalent material. Materials and Methods: The plastic phantom was arranged on the couch of the halcyon linear accelerator by Varian, with the farmer ionization chamber inserted and connected to the electrometer. The image of the setup was taken using the High-Quality Single 1280x1280x16 higher on the service mode to check the alignment with the isocenter. The beam quality TPR₂₀,₁₀ (Tissue phantom ratio) was done to check the beam quality of the machine at a field size of 10 cm x 10 cm. The calibration was done using SAD type set-up at a depth of 5 cm. This process was repeated for ten consecutive weeks, and the values were recorded. Results: The results of the beam output for the teletherapy machine were satisfactory and accepted in comparison with the commissioned measurement of 0.62. The beam quality TPR₂₀,₁₀ (Tissue phantom ratio) was reasonable with respect to the beam quality of the machine at a field size of 10 cm x 10 cm. Conclusion: The results of the beam quality and the absorbed dose rate showed a good consistency over the period of ten weeks with the commissioned measurement value.

Keywords: linear accelerator, absorbed dose rate, isocenter, phantom, ionization chamber

Procedia PDF Downloads 56
4605 Implementation of Maqasid Sharia in Islamic Financial Institution in Indonesia

Authors: Deden Misbahudin Muayyad, Lavlimatria Esya

Abstract:

Up to the month of June 2015, Indonesia has 12 Islamic Commercial Banks, 22 Islamic Business Unit, 327 offices in 33 provinces. The initial purpose of the establishment of Islamic financial institutions is to achieve and the welfare of the people in this world and in the hereafter. To realize these goals, the Islamic financial institutions in every kind of aspect of product development and in terms of operations should be based on maqashid sharia, namely keeping the faith, keep the soul, keep the sense, maintain the property, keeping the offspring. To see whether Islamic banking grounded in maqasid sharia, the Islamic banking performance measurements based on the principles of maqasid sharia. Banking performance measurement is not only focusing on profit and other financial measures, but put other values of banks reflects the size of the benefit of non-profit in accordance with the bank's objectives. The measurement using the measurement of financial performance called maqasid sharia index. Maqasid syariah index is a model of Islamic banking performance measurement in accordance with the objectives and characteristics of Islamic banking. Maqasid syariah index was developed based on three main factors, namely the education of individuals, the creation of justice, the achievement of well-being, where the three factors were in accordance with the common goal of maqasid sharia is achieving prosperity and avoid evil. Maqasid syariah index shows that maqasid sharia approach can be a strategic alternative approach to describe how good the performance of the banking system and it can be implemented in the comprehensive policy strategy. This study uses a model of performance measurement framework based on maqasid syariah, in addition to financial performance measures that already exist. Methods to develop the idea of a performance measurement framework of Islamic banking by maqasid sharia is the Sekaran method. Operationally, the methods have now able to describe the elements that will be measured by this study. This is done by observing the behavior of the dimensions illustrated through a concept that has been set. These dimensions translate into derivative elements that can be observed and more scalable, so it can establish measurement indices. This research is descriptive quantitative. Techniques are being made to collect data in this paper is by using purposive sampling method, with 12 Islamic Commercial Banks that qualify as research samples. The financial data taken at 12 banks was sourced from the annual financial statements the period 2008 to 2012 with consideration of the database and ease of access to data. The ratio measured in this study only 7 ratio used in determining the performance of Islamic banking, namely: four ratio refers to the sharia objectives related to education. three ratio while again referring to sharia objectives related to the achievement of welfare. While other ratios associated with justice can not be used in this study because of the limited data used. Total overall calculation of performance indicators and performance ratios on each goal for each bank describes the maqasid syariah index.

Keywords: Islamic banking, Maslahah, maqashid syariah, maqashid syariah index

Procedia PDF Downloads 265
4604 Design of a Virtual Instrument (VI) System for Earth Resistivity Survey

Authors: Henry Okoh, Obaro Verisa Omayuli, Gladys A. Osagie

Abstract:

One of the challenges of developing nations is the dearth of measurement devices. Aside the shortage, when available, they are either old or obsolete and also very expensive. When this is the situation, researchers must design alternative systems to help meet the desired needs of academia. This paper presents a design of cost-effective multi-disciplinary virtual instrument system for scientific research. This design was based on NI USB-6255 multifunctional DAQ which was used for earth resistivity measurement in Schlumberger array and the result obtained compared closely with that of a conventional ABEM Terrameter. This instrument design provided a hands-on experience as related to full-waveform signal acquisition in the field.

Keywords: cost-effective, data acquisition (DAQ), full-waveform, multi-disciplinary, Schlumberger array, virtual Instrumentation (VI).

Procedia PDF Downloads 466
4603 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 375
4602 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge

Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada

Abstract:

According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.

Keywords: ancestral knowledge, climate change, medicinal plants, solar energy

Procedia PDF Downloads 231
4601 Spatial Cognition and 3-Dimensional Vertical Urban Design Guidelines

Authors: Hee Sun (Sunny) Choi, Gerhard Bruyns, Wang Zhang, Sky Cheng, Saijal Sharma

Abstract:

The main focus of this paper is to propose a comprehensive framework for the cognitive measurement and modelling of the built environment. This will involve exploring and measuring neural mechanisms. The aim is to create a foundation for further studies in this field that are consistent and rigorous. Additionally, this framework will facilitate collaboration with cognitive neuroscientists by establishing a shared conceptual basis. The goal of this research is to develop a human-centric approach for urban design that is scientific and measurable, producing a set of urban design guidelines that incorporate cognitive measurement and modelling. By doing so, the broader intention is to design urban spaces that prioritize human needs and well-being, making them more liveable.

Keywords: vertical urbanism, human centric design, spatial cognition and psychology, vertical urban design guidelines

Procedia PDF Downloads 76
4600 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia

Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa

Abstract:

Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.

Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain

Procedia PDF Downloads 337
4599 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories

Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi

Abstract:

Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.

Keywords: access to services, food and nutrition security, health promotion, quilombo population

Procedia PDF Downloads 223
4598 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan

Authors: Anwar Hassen Tsega

Abstract:

International labor migration is an integral part of the modern globalized world. However, the phenomenon has its roots in some earlier periods in human history. This paper discusses the relatively new phenomenon of female migration in Africa. In the past, African women migrants were only spouses or dependent family members. But as modernity swept most African societies, with rising unemployment rates, there is evidence everywhere in Africa that women labor migration is a growing phenomenon that deserves to be understood in the context of human security research. This work explores these issues further, focusing on the experience of Ethiopian women labor migrants to Sudan. The migration of Ethiopian people to Sudan is historical; nevertheless, labor migration mainly started since the discovery and subsequent exploration of oil in the Sudan. While the paper is concerned with the human security aspect of the migrant workers, we need to be certain that the migration process will provide with a decent wage, good working conditions, the necessary social security coverage, and labor protection as a whole. However, migration to Sudan is not always safe and female migrants become subject to violence at the hands of brokers, employers and migration officials. For this matter, the paper argued that identifying the vulnerable stages and major problem facing female migrant workers at various stages of migration is a prerequisite to combat the problem and secure the lives of the migrant workers. The major problems female migrants face include extra degrees of gender-based violence, underpayment, various forms of abuse like verbal, physical and sexual and other forms of torture which include beating and slaps. This peculiar situation could be attributed to the fact that most of these women are irregular migrants and fall under the category of unskilled and/or illiterate migrants.

Keywords: Ethiopia, human security, labor migration, Sudan

Procedia PDF Downloads 247
4597 Opacity Synthesis with Orwellian Observers

Authors: Moez Yeddes

Abstract:

The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.

Keywords: security policies, opacity, formal verification, orwellian observation

Procedia PDF Downloads 223
4596 Gendered Appartus of a Military: The Role of Military Wives in Defining Security

Authors: Taarika Singh

Abstract:

Military wives – women married to army officers have largely been recognized as mere supporters or as auxiliaries to military men rather than propagators of thought and ideologies. The military wife (and her participation) is often dismissed as 'private', 'domestic', or 'trivial' and is acknowledged, if at all, only as an (inevitable/normative) entity, seen as a natural product/outcome of militarization. It is because the military wife has come to be constructed and accepted as normative by states and militaries that women of the military are easily ‘trivialised’ and are made to appear to be socially, politically, or theoretically irrelevantand/or insignificant. This paper, using ethnography-- structured and semi-structured interviews -- makes a gendered analysis of militarization, by bringing the military wife to the forefront and placing her at the nexus of the military and state apparatus. Moving away from gendered analyses that focus on the impact of militarization on women or draw attention to the ways in which militarization has been challenged/resisted by women, the paper pays attention to the centrality of women in shaping, validating, and perpetuating militarization, patriarchal control, and gendered hierarchies. The paper will demonstrate how military wives accept and comply with patriarchy as an institutional form of social organization that extends beyond the family and kinship relations into the military as an organization of the state. The paper will draw attention to the ways in which military norms, patriarchal values, and belief systems shape the social personhood, identity, and worldview of military wives; as a consequence of which, women play a central role in upholding and reproducing social inequalities and hierarchies; in shaping social status, and power relationships amongst men and women within and outside the military. The paper will allude to the processes and ideologies via which womena) accept and reproducemen as exclusive holders of power, status, and privilege; and b) recognize international relations, politics, andmatters related to security to be male dominated arenas inviting overwhelming masculine participation. In doing so, the paper will argue that women of the military play a critical role in perpetuating and upholding gendered meanings associated with the notion of and discourse around security. The paper will illustratehow military wives accept and assume security to be inherently a gendered idea -- a masculine notion, a male dominated arena, as something granted by men. In other words, the paper will demonstrate how the militarization of the military wives and the perpetuation of militarization by military wives plays a crucial role in propagating and perpetuating security to be a masculine notion or a male dominated arena. The paper will then question the degree to which such gendered analyses can shape the broader meanings, definitions, and discourses around security, matters related to security, and security threats.

Keywords: gender, militarisation, security, women

Procedia PDF Downloads 142
4595 A Demonstration of How to Employ and Interpret Binary IRT Models Using the New IRT Procedure in SAS 9.4

Authors: Ryan A. Black, Stacey A. McCaffrey

Abstract:

Over the past few decades, great strides have been made towards improving the science in the measurement of psychological constructs. Item Response Theory (IRT) has been the foundation upon which statistical models have been derived to increase both precision and accuracy in psychological measurement. These models are now being used widely to develop and refine tests intended to measure an individual's level of academic achievement, aptitude, and intelligence. Recently, the field of clinical psychology has adopted IRT models to measure psychopathological phenomena such as depression, anxiety, and addiction. Because advances in IRT measurement models are being made so rapidly across various fields, it has become quite challenging for psychologists and other behavioral scientists to keep abreast of the most recent developments, much less learn how to employ and decide which models are the most appropriate to use in their line of work. In the same vein, IRT measurement models vary greatly in complexity in several interrelated ways including but not limited to the number of item-specific parameters estimated in a given model, the function which links the expected response and the predictor, response option formats, as well as dimensionality. As a result, inferior methods (a.k.a. Classical Test Theory methods) continue to be employed in efforts to measure psychological constructs, despite evidence showing that IRT methods yield more precise and accurate measurement. To increase the use of IRT methods, this study endeavors to provide a comprehensive overview of binary IRT models; that is, measurement models employed on test data consisting of binary response options (e.g., correct/incorrect, true/false, agree/disagree). Specifically, this study will cover the most basic binary IRT model, known as the 1-parameter logistic (1-PL) model dating back to over 50 years ago, up until the most recent complex, 4-parameter logistic (4-PL) model. Binary IRT models will be defined mathematically and the interpretation of each parameter will be provided. Next, all four binary IRT models will be employed on two sets of data: 1. Simulated data of N=500,000 subjects who responded to four dichotomous items and 2. A pilot analysis of real-world data collected from a sample of approximately 770 subjects who responded to four self-report dichotomous items pertaining to emotional consequences to alcohol use. Real-world data were based on responses collected on items administered to subjects as part of a scale-development study (NIDA Grant No. R44 DA023322). IRT analyses conducted on both the simulated data and analyses of real-world pilot will provide a clear demonstration of how to construct, evaluate, and compare binary IRT measurement models. All analyses will be performed using the new IRT procedure in SAS 9.4. SAS code to generate simulated data and analyses will be available upon request to allow for replication of results.

Keywords: instrument development, item response theory, latent trait theory, psychometrics

Procedia PDF Downloads 353
4594 Sound Noise Control of a Steam Ejector in a Typical Power Plant: Design, Manufacturing, and Testing a Silencer-Muffler

Authors: Ali Siami, Masoud Asayesh, Asghar Najafi, Amirhosein Hamedanian

Abstract:

There are so many noise sources in power generation units that these sources can produce high-level sound noise. Therefore, sound noise reduction methods can assist these industries, especially in these days that laws related to environmental issues become more strict. In a typical power plant, so many machines and devices with high-level sound noise are arranged beside of each others. Therefore, the sound source identification and reducing the noise level can be very vital. In this paper, the procedure for designing, manufacturing and testing of a silencer-muffler used for a power plant steam vent is mentioned. This unit is placed near the residential area and so it is very important to reduce the noise emission. For this purpose, in the first step, measurements have done to identify the sound source and the frequency content of noise. The overall level of noise was so high and it was more than 120dB. Then, the appropriate noise control device is designed according to the measurement results and operational conditions. In the next step, the designed silencer-muffler has been manufactured and installed on the steam discharge of the ejector. For validation of the silencer-muffler effect, the acoustic test was done again in operating mode. Finally, the measurement results before and after the installation are compared. The results have confirmed a considerable reduction in noise level resultant of using silencer-muffler in the designed frequency range.

Keywords: silencer-muffler, sound noise control, sound measurement, steam ejector

Procedia PDF Downloads 375
4593 Ethics and Military Defections in Nonviolent Resistance Campaigns

Authors: Adi Levy

Abstract:

Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.

Keywords: culpability, defections, nonviolence, permissibility

Procedia PDF Downloads 111
4592 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 87
4591 Validation of the Formula for Air Attenuation Coefficient for Acoustic Scale Models

Authors: Katarzyna Baruch, Agata Szelag, Aleksandra Majchrzak, Tadeusz Kamisinski

Abstract:

Methodology of measurement of sound absorption coefficient in scaled models is based on the ISO 354 standard. The measurement is realised indirectly - the coefficient is calculated from the reverberation time of an empty chamber as well as a chamber with an inserted sample. It is crucial to maintain the atmospheric conditions stable during both measurements. Possible differences may be amended basing on the formulas for atmospheric attenuation coefficient α given in ISO 9613-1. Model studies require scaling particular factors in compliance with specified characteristic numbers. For absorption coefficient measurement, these are for example: frequency range or the value of attenuation coefficient m. Thanks to the possibilities of modern electroacoustic transducers, it is no longer a problem to scale the frequencies which have to be proportionally higher. However, it may be problematic to reduce values of the attenuation coefficient. It is practically obtained by drying the air down to a defined relative humidity. Despite the change of frequency range and relative humidity of the air, ISO 9613-1 standard still allows the calculation of the amendment for little differences of the atmospheric conditions in the chamber during measurements. The paper discusses a number of theoretical analyses and experimental measurements performed in order to obtain consistency between the values of attenuation coefficient calculated from the formulas given in the standard and by measurement. The authors performed measurements of reverberation time in a chamber made in a 1/8 scale in a corresponding frequency range, i.e. 800 Hz - 40 kHz and in different values of the relative air humidity (40% 5%). Based on the measurements, empirical values of attenuation coefficient were calculated and compared with theoretical ones. In general, the values correspond with each other, but for high frequencies and low values of relative air humidity the differences are significant. Those discrepancies may directly influence the values of measured sound absorption coefficient and cause errors. Therefore, the authors made an effort to determine an amendment minimizing described inaccuracy.

Keywords: air absorption correction, attenuation coefficient, dimensional analysis, model study, scaled modelling

Procedia PDF Downloads 414
4590 Iterative Panel RC Extraction for Capacitive Touchscreen

Authors: Chae Hoon Park, Jong Kang Park, Jong Tae Kim

Abstract:

Electrical characteristics of capacitive touchscreen need to be accurately analyzed to result in better performance for multi-channel capacitance sensing. In this paper, we extracted the panel resistances and capacitances of the touchscreen by comparing measurement data and model data. By employing a lumped RC model for driver-to-receiver paths in touchscreen, we estimated resistance and capacitance values according to the physical lengths of channel paths which are proportional to the RC model. As a result, we obtained the model having 95.54% accuracy of the measurement data.

Keywords: electrical characteristics of capacitive touchscreen, iterative extraction, lumped RC model, physical lengths of channel paths

Procedia PDF Downloads 332
4589 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption

Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem

Abstract:

In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.

Keywords: chaos, encryption, security, image

Procedia PDF Downloads 470
4588 Determinants of Household Food Security in Addis Ababa City Administration

Authors: Estibe Dagne Mekonnen

Abstract:

In recent years, the prevalence of undernourishment was 30 percent for sub-Saharan Africa, compared with 16 percent for Asia and the Pacific (Ali, 2011). In Ethiopia, almost 40 percent of the total population in the country and 57 percent of Addis Ababa population lives below the international poverty line of US$ 1.25 per day (UNICEF, 2009). This study aims to analyze the determinant of household food secrity in Addis Ababa city administration. Primary data were collected from a survey of 256 households in the selected sub-city, namely Addis Ketema, Arada, and Kolfe Keranio, in the year 2022. Both Purposive and multi-stage cluster random sampling procedures were employed to select study areas and respondents. Descriptive statistics and order logistic regression model were used to test the formulated hypotheses. The result reveals that out of the total sampled households, 25% them were food secured, 13% were mildly food insecure, 26% were moderately food insecure and 36% were severely food insecure. The study indicates that household family size, house ownership, household income, household food source, household asset possession, household awareness on inflation, household access to social protection program, household access to credit and saving and household access to training and supervision on food security have a positive and significant effect on the likelihood of household food security status. However, marital status of household head, employment sector of household head, dependency ratio and household’s nonfood expenditure has a negative and significant influence on household food security status. The study finally suggests that the government in collaboration with financial institutions and NGO should work on sustaining household food security by creating awareness, providing credit, facilitate rural-urban linkage between producer and consumer and work on urban infrastructure improvement. Moreover, the governments also work closely and monitor consumer good suppliers, if possible find a way to subsidize consumable goods to more insecure households and make them to be food secured. Last but not least, keeping this country’s peace will play a crucial role to sustain food security.

Keywords: determinants, household, food security, order logit model, Addis Ababa

Procedia PDF Downloads 70
4587 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 294
4586 Refractometric Optical Sensing by Using Photonics Mach–Zehnder Interferometer

Authors: Gong Zhang, Hong Cai, Bin Dong, Jifang Tao, Aiqun Liu, Dim-Lee Kwong, Yuandong Gu

Abstract:

An on-chip refractive index sensor with high sensitivity and large measurement range is demonstrated in this paper. The sensing structures are based on Mach-Zehnder interferometer configuration, built on the SOI substrate. The wavelength sensitivity of the sensor is estimated to be 3129 nm/RIU. Meanwhile, according to the interference pattern period changes, the measured period sensitivities are 2.9 nm/RIU (TE mode) and 4.21 nm/RIU (TM mode), respectively. As such, the wavelength shift and the period shift can be used for fine index change detection and larger index change detection, respectively. Therefore, the sensor design provides an approach for large index change measurement with high sensitivity.

Keywords: Mach-Zehnder interferometer, nanotechnology, refractive index sensing, sensors

Procedia PDF Downloads 443
4585 DCT and Stream Ciphers for Improved Image Encryption Mechanism

Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani

Abstract:

Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.

Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher

Procedia PDF Downloads 358
4584 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 359
4583 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa

Authors: Blessings Masuku

Abstract:

This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.

Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance

Procedia PDF Downloads 60
4582 The Correlation between Head of Bed Angle and IntraAbdominal Pressure of Intubated Patients; a Pre-Post Clinical Trial

Authors: Sedigheh Samimian, Sadra Ashrafi, Tahereh Khaleghdoost Mohammadi, Mohammad Reza Yeganeh, Ali Ashraf, Hamideh Hakimi, Maryam Dehghani

Abstract:

Introduction: The recommended position for measuring Intra-Abdominal Pressure (IAP) is the supine position. However, patients put in this position are prone to Ventilator-associated pneumonia. This study was done to evaluate the relationship between bed head angle and IAP measurements of intubated patients in the intensive care unit. Methods: In this clinical trial, seventy-six critically ill patients under mechanical ventilation were enrolled. IAP measurement was performed every 8 hours for 24 hours using the KORN method in three different degrees of the head of bed (HOB) elevation (0°, 15°, and 30°). Bland-Altman analysis was performed to identify the bias and limits of agreement among the three HOBs. According to World Society of the Abdominal Compartment Syndrome (WSACS), we can consider two IAP techniques equivalent if a bias of <1 mmHg and limits of agreement of - 4 to +4 were found between them. Data were analyzed using SPSS statistical software (v. 19), and the significance level was considered as 0.05. Results: The prevalence of intra-abdominal hypertension was 18.42%. Mean ± standard deviation (SD) of IAP were 8.44 ± 4.02 mmHg for HOB angle 0°, 9.58 ± 4.52 for HOB angle 15°, and 11.10 ± 4.73 for HOB angle 30o (p = 0.0001). The IAP measurement bias between HOB angle 0◦ and HOB angle 15° was 1.13 mmHg. This bias was 2.66 mmHg between HOB angle 0° and HOB angle 30°. Conclusion: Elevation of HOB angle from 0 to 30 degree significantly increases IAP. It seems that the measurement of IAP at HOB angle 15° was more reliable than 30°.

Keywords: pressure, intra-abdominal hypertension, head of bed, critical care, compartment syndrome, supine position

Procedia PDF Downloads 67
4581 Development of a Green Star Certification Tool for Existing Buildings in South Africa

Authors: Bouwer Kleynhans

Abstract:

The built environment is responsible for about 40% of the world’s energy consumption and generates one third of global carbon dioxide emissions. The Green Building Council of South Africa’s (GBCSA) current rating tools are all for new buildings. By far the largest portion of buildings exist stock and therefore the need to develop a certification tool for existing buildings. Direct energy measurement comprises 27% of the total available points in this tool. The aim of this paper is to describe the development process of a green star certification tool for existing buildings in South Africa with specific emphasis on the energy measurement criteria. Successful implementation of this tool within the property market will ensure a reduced carbon footprint of buildings.

Keywords: certification tool, development process, energy consumption, green buildings

Procedia PDF Downloads 318
4580 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 278
4579 Perceived Procedural Justice and Organizational Citizenship Behavior: Evidence from a Security Organization

Authors: Noa Nelson, Orit Appel, Rachel Ben-ari

Abstract:

Organizational Citizenship Behavior (OCB) is voluntary employee behavior that contributes to the organization beyond formal job requirements. It can take different forms, such as helping teammates (OCB toward individuals; hence, OCB-I), or staying after hours to attend a task force (OCB toward the organization; hence, OCB-O). Generally, OCB contributes substantially to organizational climate, goals, productivity, and resilience, so organizations need to understand what encourages it. This is particularly challenging in security organizations. Security work is characterized by high levels of stress and burnout, which is detrimental to OCB, and security organizational design emphasizes formal rules and clear hierarchies, leaving employees with less freedom for voluntary behavior. The current research explored the role of Perceived Procedural Justice (PPJ) in enhancing OCB in a security organization. PPJ refers to how fair decision-making processes are perceived to be. It involves the sense that decision makers are objective, attentive to everyone's interests, respectful in their communications and participatory - allowing individuals a voice in decision processes. Justice perceptions affect motivation, and it was specifically suggested that PPJ creates an attachment to one's organization and personal interest in its success. Accordingly, PPJ had been associated with OCB, but hardly any research tested their association with security organizations. The current research was conducted among prison guards in the Israel Prison Service, to test a correlational and a causal association between PPJ and OCB. It differentiated between perceptions of direct commander procedural justice (CPJ), and perceptions of organization procedural justice (OPJ), hypothesizing that CPJ would relate to OCB-I, while OPJ would relate to OCB-O. In the first study, 336 prison guards (305 male) from 10 different prisons responded to questionnaires measuring their own CPJ, OPJ, OCB-I, and OCB-O. Hierarchical linear regression analyses indicated the significance of commander procedural justice (CPJ): It associated with OCB-I and also associated with OPJ, which, in turn, associated with OCB-O. The second study tested CPJ's causal effects on prison guards' OCB-I and OCB-O; 311 prison guards (275 male) from 14 different prisons read scenarios that described either high or low CPJ, and then evaluated the likelihood of that commander's prison guards performing OCB-I and OCB-O. In this study, CPJ enhanced OCB-O directly. It also contributed to OCB-I, indirectly: CPJ enhanced the motivation for collaboration with the commander, which respondents also evaluated after reading scenarios. Collaboration, in turn, associated with OCB-I. The studies demonstrate that procedural justice, especially commander's PJ, promotes OCB in security work environments. This is important because extraordinary teamwork and motivation are needed to deal with emergency situations and with delicate security challenges. Following the studies, the Israel Prison Service implemented personal procedural justice training for commanders and unit level programs for procedurally just decision processes. From a theoretical perspective, the studies extend the knowledge on PPJ and OCB to security work environments and contribute evidence on PPJ's causal effects. They also call for further research, to understand the mechanisms through which different types of PPJ affect different types of OCB.

Keywords: organizational citizenship behavior, perceived procedural justice, prison guards, security organizations

Procedia PDF Downloads 220
4578 Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure

Authors: Jiri F. Urbanek, Jiri Barta, Oldrich Svoboda, Jiri J. Urbanek

Abstract:

The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/ business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply-customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling.

Keywords: added value, DYVELOP, controlling, environments, process approach

Procedia PDF Downloads 411
4577 Understanding Europe’s Role in the Area of Liberty, Security, and Justice as an International Actor

Authors: Barrere Sarah

Abstract:

The area of liberty, security, and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.

Keywords: European penal law, international scene, liberty security and justice area, mutual recognition

Procedia PDF Downloads 404