Search results for: state security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9533

Search results for: state security

8783 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 535
8782 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 633
8781 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review

Authors: Gholamreza Farrokhi, Behzad Sani

Abstract:

The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.

Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future

Procedia PDF Downloads 349
8780 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria

Authors: J. O. Ayinde, S. O. Olatunji

Abstract:

This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.

Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security

Procedia PDF Downloads 202
8779 Computational Approaches for Ballistic Impact Response of Stainless Steel 304

Authors: A. Mostafa

Abstract:

This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.

Keywords: ballistic velocity, stainless steel, numerical approaches, security screen

Procedia PDF Downloads 147
8778 Strategies Considered Effective for Funding Public Tertiary Institutions in Nigeria

Authors: Jacinta Ifeoma Obidile

Abstract:

The study sought to ascertain from the opinions of the business educators, effective strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Funding of tertiary institutions has become so important following the dilapidated state of most of the public tertiary institutions in Nigeria. Tertiary institutions are known for the production of competitive and competent workforce in the nation. Considering the state of public tertiary institutions currently, one wonders if their objectives are achieved. Many scholars have identified funding as one of the major barriers to effective functioning of tertiary institutions. Although federal and state governments have been supporting the tertiary institutions, but their support seems not to be adequate. This study therefore ascertained from the perspective of business educators, other strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Survey research design was adopted for the study. A total of 104 business educators from the public tertiary institutions in the State constituted the population. There was no sampling, hence the whole population was used. Structured questionnaire validated by three experts with a reliability coefficient of 0.82 was the instrument for data collection. Data collected were analyzed using mean and standard deviation. Findings from the study revealed that public-private partnership and external aids were among the strategies considered effective for funding public tertiary institutions. It was therefore recommended among others that associations like alumni should be strongly instituted in each of the public tertiary institutions so as to assist in the funding of tertiary institutions for effective functioning and delivery.

Keywords: strategies, funding, tertiary institutions, business educators

Procedia PDF Downloads 146
8777 Protecting Migrants at Risk as Internally Displaced Persons: State Responses to Foreign Immigrants Displaced by Natural Disasters in Thailand, The United States, and Japan

Authors: Toake Endoh

Abstract:

Cross-border migration of people is a critical driver for sustainable economic development in the Asia-Pacific region. Meanwhile, the region is susceptible to mega-scale natural disasters, such as tsunami, earthquakes, and typhoons. When migrants are stranded in a foreign country by a disaster, who should be responsible for their safety and security? What legal or moral foundation is there to advocate for the protection and assistance of “migrants at risk (M@R)”? How can the states practice “good governance” in their response to displacement of the foreign migrants? This paper inquires how to protect foreign migrants displaced by a natural disaster under international law and proposes protective actions to be taken by of migrant-receiver governments. First, the paper discusses the theoretical foundation for protection of M@R and argues that the nation-states are charged of responsibility to protect at-risk foreigners as “internally displaced persons” in the light of the United Nations’ Guiding Principles of Internal Displacement (1998). Second, through the case study of the Kobe Earthquake in Japan (1995), the Tsunami in Thailand (2004), and the Hurricane Katrina in the U.S. (2005), the paper evaluates how effectively (or poorly) institutions and state actors addressed the specific vulnerability felt by M@R in these crises.

Keywords: internal displaced persons, natural disaster, international migration, responsibility to protect

Procedia PDF Downloads 305
8776 Mechanisms and Process of an Effective Public Policy Formulation in Islamic Economic System

Authors: Md Abu Saieed

Abstract:

Crafting and implementing public policy is one of the indispensable works in any form of state and government. But the policy objectives, methods of formulation and tools of implementation might be different based on the ideological nature, historical legacy, structure and capacity of administration and management and other push and factors. Public policy in Islamic economic system needs to be based on the key guidelines of divine scriptures along with other sources of sharia’h. As a representative of Allah (SWT), the governor and other apparatus of the state will formulate and implement public policies which will enable to establish a true welfare state based on justice, equity and equality. The whole life of Prophet Muhammad (pbuh) and his policy in operating state of affairs in Madina is the practical guidelines for the policy actors and professionals in Islamic system of economics. Moreover, policy makers need to be more meticulous in formulating Islamic public policy which meets the needs and demands of contemporary worlds as well.

Keywords: formulation, Islam, public policy, policy factors, Sharia’h

Procedia PDF Downloads 336
8775 Branding Tourism Destinations; The Trending Initiatives for Edifice Image Choices of Foreign Policy

Authors: Mehtab Alam, Mudiarasan Kuppusamy, Puvaneswaran Kunaserkaran

Abstract:

The purpose of this paper is to bridge the gap and complete the relationship between tourism destinations and image branding as a choice of edifice foreign policy. Such options became a crucial component for individuals interested in leisure and travel activities. The destination management factors have been evaluated and analyzed using the primary and secondary data in a mixed-methods approach (quantitative sample of 384 and qualitative 8 semi-structured interviews at saturated point). The study chose the Environmental Management Accounting (EMA) and Image Restoration (IR) theories, along with a schematic diagram and an analytical framework supported by NVivo software 12, for two locations in Abbottabad, KPK, Pakistan: Shimla Hill and Thandiani. This incorporates the use of PLS-SEM model for assessing validity of data while SPSS for data screening of descriptive statistics. The results show that destination management's promotion of tourism has significantly improved Pakistan's state image. The use of institutional setup, environmental drivers, immigration, security, and hospitality as well as recreational initiatives on destination management is encouraged. The practical ramifications direct the heads of tourism projects, diplomats, directors, and policymakers to complete destination projects before inviting people to Pakistan. The paper provides the extent of knowledge for academic tourism circles to use tourism destinations as brand ambassadors.

Keywords: tourism, management, state image, foreign policy, image branding

Procedia PDF Downloads 59
8774 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 98
8773 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 232
8772 Precarious ID Cards - Studying Documentary Practices in India through the Lens of Internal Migration

Authors: Ambuja Raj

Abstract:

This research will attempt to understand how documents are materially indispensable civic artifacts for migrants in their encounters with the state. Documents such as ID cards are sites of mediation and bureaucratic manifestation which reveal the inherent dynamics of power between the state and a delocalized people. While ID cards allow the holder to retain a different identity and articulate their demands as a citizen, they at the same time transform subjects into ‘objects’ in the exercise of governmental power. The research is based on the study of internal migrants in India, who are ‘visible’ to the state through its host of ID documents such as the ‘Aadhaar card’, electoral IDs, Ration cards, and a variety of region-specific documents, without the possession of which, not only are they unable to access jobs, public goods and services, and accommodation, but are liable to exploitation from state forces and mediators. Through semi-structured interviews with social actors in the processes of documentation and welfare of migrants, as well as with settlements of migrants themselves located in the state of Kerala in India, the thesis will attempt to understand the salience of documentary practices in the lives of inter-state migrants who move within Indian states in the hope of bettering their economic conditions. The research will trace the material and evolving significance of ID cards in the tenacity of states dealing with these ‘illegible’ populations. It will try to bring theories of governmentality, biopolitics and Weberian bureaucracy into the migrant issue while critically grounding itself on secondary literature by scholars who have worked on South Asian ‘governments of paper’.

Keywords: migration, historiography of documents, anthropology of state, documentary practices

Procedia PDF Downloads 181
8771 The State Support to the Tourism Policy Formation Mechanism in Black Sea Basin Countries (Azerbaijan, Turkey, Russia, Georgia) and Its Impact on Sustainable Tourism Development

Authors: A. Bahar Ganiyeva, M. Sabuhi Tanriverdiyev

Abstract:

The article analyzes state support and policy mechanisms aimed at driving tourism as one of the vibrant and rapidly developing economies. State programs and long-range strategic roadmaps and previous programs execution, results and their impact on the particular countries economy have been raised during the research. This theme provides a useful framework for discussions with a wider range of stakeholders as the implications arising are of importance both for academics and practitioners engaged in hospitality and tourism development and research. The impact that tourism has on sustainable regional development in emerging markets is highly substantial. For Azerbaijan, Turkey, Georgia, and Russia, with their rich natural resources and cultural heritage, tourism can be an important basis for economic expansion, and a way to form an acceptable image of the countries as safe, open, hospitable, and complex.

Keywords: Sustainable tourism, hospitality, destination, strategic roadmap, tourism, economy, growth, state support, mechanism, policy formation, state program

Procedia PDF Downloads 145
8770 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017

Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez

Abstract:

Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.

Keywords: water access, agriculture, livestock, FIES

Procedia PDF Downloads 141
8769 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country

Authors: Meszár Tárik

Abstract:

The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.

Keywords: Middle East, Iraq, Islamic State, minorities

Procedia PDF Downloads 78
8768 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 367
8767 Fragile States as the Fertile Ground for Non-State Actors: Colombia and Somalia

Authors: Giorgi Goguadze, Jakub Zajączkowski

Abstract:

This paper is written due to overview the connection between fragile states and non-state actors, we should take into account that fragile states may vary from weak, failing and failed. In this paper we will discuss about two countries, one of them is weak (Colombia/ second one is already failed- Somalia. We will try to understand what feeds ill non-state actors such as: terrorist organizations, criminal entities and other cells in these countries, what threats are they representing and how to eliminate these dangers in both national and international scope. This paper is mainly based on literature overview and personal attitude and doesn’t claim to be in scientific chain.

Keywords: fragile States, terrorism, tribalism, Somalia

Procedia PDF Downloads 360
8766 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia

Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa

Abstract:

Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.

Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain

Procedia PDF Downloads 330
8765 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories

Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi

Abstract:

Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.

Keywords: access to services, food and nutrition security, health promotion, quilombo population

Procedia PDF Downloads 219
8764 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan

Authors: Anwar Hassen Tsega

Abstract:

International labor migration is an integral part of the modern globalized world. However, the phenomenon has its roots in some earlier periods in human history. This paper discusses the relatively new phenomenon of female migration in Africa. In the past, African women migrants were only spouses or dependent family members. But as modernity swept most African societies, with rising unemployment rates, there is evidence everywhere in Africa that women labor migration is a growing phenomenon that deserves to be understood in the context of human security research. This work explores these issues further, focusing on the experience of Ethiopian women labor migrants to Sudan. The migration of Ethiopian people to Sudan is historical; nevertheless, labor migration mainly started since the discovery and subsequent exploration of oil in the Sudan. While the paper is concerned with the human security aspect of the migrant workers, we need to be certain that the migration process will provide with a decent wage, good working conditions, the necessary social security coverage, and labor protection as a whole. However, migration to Sudan is not always safe and female migrants become subject to violence at the hands of brokers, employers and migration officials. For this matter, the paper argued that identifying the vulnerable stages and major problem facing female migrant workers at various stages of migration is a prerequisite to combat the problem and secure the lives of the migrant workers. The major problems female migrants face include extra degrees of gender-based violence, underpayment, various forms of abuse like verbal, physical and sexual and other forms of torture which include beating and slaps. This peculiar situation could be attributed to the fact that most of these women are irregular migrants and fall under the category of unskilled and/or illiterate migrants.

Keywords: Ethiopia, human security, labor migration, Sudan

Procedia PDF Downloads 239
8763 Responsibility to Protect: The Continuing Post-Colonial Western Hegemony

Authors: Helyeh Doutaghi

Abstract:

In 2005, the doctrine of Responsibility to Protect (R2P) was created by the UN Member States agreeing to not only to have the primary responsibility to protect their civilians from genocide, war crimes, crimes against humanity and ethnic cleansing, but also to be responsible towards those civilians whose State was found manifestly failing in that regard. This paper will assess the doctrine of R2P and will argue that R2P too, just like humanitarian intervention, suffers from a lack of legal basis and political will to implement it. Or better said, it is being selectively used by the hegemon’s power to achieve its political will. In doing so, the origin and development shall be explained. Furthermore, it will be submitted that R2P has failed to achieve its purpose due to the unresolved Security Council’s deadlock. Lastly, the concept of legal morality entailed in R2P and its use in real life cases since 2005 will be examined.

Keywords: responsibility to protect, humanitarian intervention, United Nations, legitimacy, legality

Procedia PDF Downloads 332
8762 Opacity Synthesis with Orwellian Observers

Authors: Moez Yeddes

Abstract:

The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.

Keywords: security policies, opacity, formal verification, orwellian observation

Procedia PDF Downloads 218
8761 Ethics and Military Defections in Nonviolent Resistance Campaigns

Authors: Adi Levy

Abstract:

Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.

Keywords: culpability, defections, nonviolence, permissibility

Procedia PDF Downloads 106
8760 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 82
8759 Impact of Disposed Drinking Water Sachets in Damaturu Town, Yobe State, Nigeria

Authors: Meeta Ratawa Tiwary

Abstract:

Damaturu is the capital of Yobe State in northeastern Nigeria where civic amenities and facilities are not adequate even after 24 years of its existence. The volatile security and political situations are most significant causes for the same. The basic facility for the citizens in terms of drinking water and electricity are not available. For the drinking water, they have to rely on personal bore holes or the filtered borehole waters available in packaged sachets in the market. The present study is concerned with the environmental impact of indiscriminate disposal of drinking synthetic polythene water sachets in Damaturu. The sachet water is popularly called as ‘pure water’, but its purity is questionable. Increased production and consumption of sachet water has led to indiscriminate dumping and disposal of empty sachets leading to a serious environmental threat. The evidence of this is seen in the amount of disposed sachets littering the streets and also the drainages blocked by ‘blocks’ of water sachet waste. Sachet water gained much popularity in Nigeria because the product is convenient for use, affordable and economically viable. The present study aims to find out the solution to this environmental problem. The field-based study has found some significant factors that cause environmental and socio-economic effect due to this. Some recommendations have been made based on research findings regarding sustainable waste management, recycling and re-use of the non-biodegradable products in society.

Keywords: civic amenities, non-biodegradable, pure water, sustainable environment, waste disposal

Procedia PDF Downloads 410
8758 Resistance to Chloride Penetration of High Strength Self-Compacting Concretes: Pumice and Zeolite Effect

Authors: Kianoosh Samimi, Siham Kamali-Bernard, Ali Akbar Maghsoudi

Abstract:

This paper aims to contribute to the characterization and the understanding of fresh state, compressive strength and chloride penetration tendency of high strength self-compacting concretes (HSSCCs) where Portland cement type II is partially substituted by 10% and 15% of natural pumice and zeolite. First, five concrete mixtures with a control mixture without any pozzolan are prepared and tested in both fresh and hardened states. Then, resistance to chloride penetration for all formulation is investigated in non-steady state and steady state by measurement of chloride penetration and diffusion coefficient. In non-steady state, the correlation between initial current and chloride penetration with diffusion coefficient is studied. Moreover, the relationship between diffusion coefficient in non-steady state and electrical resistivity is determined. The concentration of free chloride ions is also measured in steady state. Finally, chloride penetration for all formulation is studied in immersion and tidal condition. The result shows that, the resistance to chloride penetration for HSSCC in immersion and tidal condition increases by incorporating pumice and zeolite. However, concrete with zeolite displays a better resistance. This paper shows that the HSSCC with 15% pumice and 10% zeolite is suitable in fresh, hardened, and durability characteristics.

Keywords: Chloride penetration, immersion, pumice, HSSCC, tidal, zeolite

Procedia PDF Downloads 238
8757 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption

Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem

Abstract:

In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.

Keywords: chaos, encryption, security, image

Procedia PDF Downloads 465
8756 The Power of a Vulnerable State: The Rights Revolution and the Emergence of Human Resources Management Departments

Authors: Soheila Ghanbari

Abstract:

After the Civil Rights Act of 1964 was enacted, federal policy transformed employment rights. Equal employment opportunity law, legislation for occupational safety and health, and regulations for fringe benefits were established to ensure that employees have rights to equal protection, health and safety, and the benefits guaranteed by employers. In research analyzing data from 279 organizations over time, it was discovered that legal changes prompted organizations to establish personnel, antidiscrimination, safety, and benefits departments to ensure compliance. However, as the process of institutionalization advanced, middle managers began to separate these fresh offices from policy and rationalize them solely in economic terms as a component of the new human resources management model. This common occurrence is seen in the United States, where the Constitution represents government control of business as unlawful. It could potentially clarify the extended lack of a state theory in organizational analysis and shed light on a puzzle pointed out by state theorists: the federal state is weak in terms of administration but strong in terms of norms.

Keywords: management, state, human, resources, employment

Procedia PDF Downloads 33
8755 Combating Contraflow to Creativity Amongst Preservice Teachers in Teacher Arts Education

Authors: Michael Flannery, Annie ó Breacháin

Abstract:

Teaching the creative arts in preservice teacher education can be challenging. Some students find artistic self-expression and its related creative processes overwhelming. Low creative self-efficacy levels and creative habits of mind can impede their levels of motivation, engagement and persistence. For some, creative arts engagement can induce a state of anxiety and distress as opposed to flow. Flow theory posits that learners are happiest when they are learning in a state of flow. During the flow state, students feel, think and perform their best. They become so involved in the learning experience that nothing else seems to matter. The creative flow state is a crucial conduit of artistic processes to enable learners to explore and produce their best work. Despite the research conducted on flow state across several contexts, the phenomenon of personal flow state remains quite elusive. While some research has examined flow in relation to characteristics, conditions and personality traits, no research has investigated individuals' personal experiences of flow in a visual and tangible manner nor explored a relationship between flow state and teachers’ artistic development. This explorative case study explores preservice teachers’ impressions of flow using an arts-based approach. It identifies, categorizes and discusses patterns of commonality and difference. Grounded by theory concerning flow, self-efficacy and creative habits, this study ponders how emerging findings regarding flow impressions might aid teacher arts educators in helping preservice teachers who struggle with creative self-expression.

Keywords: creative arts, flow theory, presence, self-efficacy, teacher education

Procedia PDF Downloads 17
8754 On the convergence of the Mixed Integer Randomized Pattern Search Algorithm

Authors: Ebert Brea

Abstract:

We propose a novel direct search algorithm for identifying at least a local minimum of mixed integer nonlinear unconstrained optimization problems. The Mixed Integer Randomized Pattern Search Algorithm (MIRPSA), so-called by the author, is based on a randomized pattern search, which is modified by the MIRPSA for finding at least a local minimum of our problem. The MIRPSA has two main operations over the randomized pattern search: moving operation and shrinking operation. Each operation is carried out by the algorithm when a set of conditions is held. The convergence properties of the MIRPSA is analyzed using a Markov chain approach, which is represented by an infinite countable set of state space λ, where each state d(q) is defined by a measure of the qth randomized pattern search Hq, for all q in N. According to the algorithm, when a moving operation is carried out on the qth randomized pattern search Hq, the MIRPSA holds its state. Meanwhile, if the MIRPSA carries out a shrinking operation over the qth randomized pattern search Hq, the algorithm will visit the next state, this is, a shrinking operation at the qth state causes a changing of the qth state into (q+1)th state. It is worthwhile pointing out that the MIRPSA never goes back to any visited states because the MIRPSA only visits any qth by shrinking operations. In this article, we describe the MIRPSA for mixed integer nonlinear unconstrained optimization problems for doing a deep study of its convergence properties using Markov chain viewpoint. We herein include a low dimension case for showing more details of the MIRPSA, when the algorithm is used for identifying the minimum of a mixed integer quadratic function. Besides, numerical examples are also shown in order to measure the performance of the MIRPSA.

Keywords: direct search, mixed integer optimization, random search, convergence, Markov chain

Procedia PDF Downloads 459