Search results for: global security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7610

Search results for: global security

6830 Design and Implementation of a Nano-Power Wireless Sensor Device for Smart Home Security

Authors: Chia-Chi Chang

Abstract:

Most battery-driven wireless sensor devices will enter in sleep mode as soon as possible to extend the overall lifetime of a sensor network. It is necessary to turn off unnecessary radio and peripheral functions, especially the radio unit always consumes more energy than other components during wireless communication. The microcontroller is the most important part of the wireless sensor device. It is responsible for the manipulation of sensing data and communication protocols. The microcontroller always has different sleep modes, each with a different level of energy usage. The deeper the sleep, the lower the energy consumption. Most wireless sensor devices can only enter the sleep mode: the external low-frequency oscillator is still running to wake up the sleeping microcontroller when the sleep timer expires. In this paper, our sensor device can enter the extended sleep mode: none of the oscillator is running and the wireless sensor device has the nanoampere consumption and self-awaking ability. Finally, these wireless sensor devices were deployed in a smart home security network.

Keywords: wireless sensor network, battery-driven, sleep mode, home security

Procedia PDF Downloads 303
6829 Postmodern Navy to Transnational Adaptive Navy: Positive Peace with Borderless Institutional Network

Authors: Serkan Tezgel

Abstract:

Effectively managing threats and power that transcend national boundaries requires a reformulation from the traditional post-modern navy to an adaptive and institutional transnational navy. By analyzing existing soft power concept, post-modern navy, and sea power, this study proposes the transnational navy, founded on the triangle of main attributes of transnational companies, 'Global Competitiveness, Local Responsiveness, Worldwide Learning and Innovation Sharing', a new model which will lead to a positive peace with an institutional network. This transnational model necessitates 'Transnational Navies' to help establish peace with collective and transnational understanding during a transition period 'Reactive Postmodern Navy' has been experiencing. In this regard, it is fairly claimed that a new paradigm shift will revolve around sea power to establish good order at sea with collective and collaborative initiatives and bound to breed new theories and ideas in the forthcoming years. However, there are obstacles to overcome. Postmodern navies, currently shaped by 'Collective Maritime Security' and 'Collective Defense' concepts, can not abandon reactive applications and acts. States deploying postmodern navies to realize their policies on international platforms and seapower structures shaped by the axis of countries’ absolute interests resulted in multipolar alliances and coalitions, but the establishment of the peace. These obstacles can be categorized into three tiers in establishing a unique transnational model navy: Strategic, Organizational and Management challenges. To overcome these obstacles and challenges, postmodern navies should transform into cooperative, collective and independent soft transnational navies with the transnational mentality, global commons, and institutional network. Such an adaptive institution can help the world navigate to a positive peace.

Keywords: postmodern navy, transnational navy, transnational mentality, institutional network

Procedia PDF Downloads 515
6828 Big Brain: A Single Database System for a Federated Data Warehouse Architecture

Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf

Abstract:

Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.

Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)

Procedia PDF Downloads 232
6827 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 131
6826 Campaigns of Youth Empowerment and Unemployment in Development Discourses: Case of Ethiopia

Authors: Belay Mulat Fentie

Abstract:

In today’s high decrement figure of the global economy, nations are facing many economic, social, and political challenges; universally, there is high distress of food and other survival insecurity. Further, as a result of conflict, natural disaster, and leadership influences, youths are existentially less empowered and unemployed, especially in developing countries. With this situation to handle well challenges, it’s important to search, investigate and deliberate about youth, unemployment, empowerment, and possible management fashions, as youths has a potential to carry and fight such battles. The method adopted is qualitative analysis of secondary data sources in youth empowerment, unemployment, and development as inclusive framework. Youth unemployment is a major development headache for most African countries. In Ethiopia, following weak youth empowerment, youth unemployment has been increased time to time; and quality education and organizations linkage matters as an important constraint. As a management challenge, although accessibility of quality education for Ethiopian youths is an important constraint; the country youths fortified deceptively and harassed in a vicious political challenge in their struggle to fetch social and economic changes in the country. Further, thousands of youths inactivated, criminalized, and lost their lives, and this makes youths to be hopeless, anger in their lives and pushes further to expose for addictions, prostitution, violence, and illegitimate migrations. This youth challenge didn’t only destinate in African countries, rather, indeed, the global burden and headed as a global agenda. As a resolution, the construction of a healthy education system can create independent youths that acquire success and accelerate development. Developing countries should ensue development in cultivation of empowerment tool through long and short-term education, implementing policy in action, diminishing wide ranged gaps of (religion, ethnicity & region), and take the high youth population as an opportunity and empower them. And further manage and empower youths to involve in decision making, in giving political weight and build a network on organizations to easily access jobs opportunities are important suggestion to alive youths in work, for both increasing their income and country food security balance.

Keywords: development, Ethiopia, management, unemployment, youth empowerment

Procedia PDF Downloads 130
6825 Enhancing the Use of Traditional, Complementary and Alternative Medicines into Global Cancer Treatment and Research

Authors: Alejandro Salicrup, Riacrdo Gelhman, Geetha Gopalakrishna

Abstract:

The main aim of this session is to have a panel to discuss specific steps for the integration of traditional, complementary and alternative medicine (TCAM) with conventional oncology for enhancing treatment practices at the global level, specifically in low-and-middle-income-countries (LMICs). Concrete current and required programs for strengthening Integrative Oncology research in LMICs will also be discussed. Case Studies from Latin America, Asia, Europe and Africa will discuss and highlight 1) What is working regarding treatment practices in integrative oncology in their countries/regions providing concrete examples 2) What is not working on this integration for cancer treatment in their countries/regions with concrete examples and 3) What are the challenges and opportunities for research related to integrative oncology treatment. Discussion will include potential next steps and potential mechanisms to enhance global integrative oncology research aimed to enhance the use of TCAM therapies and strengthening cancer treatment in LMICs.

Keywords: global cancer treatment, integrative oncology research, low and middle income countries, traditional, complementary and alternative medicines

Procedia PDF Downloads 119
6824 Designing Roudbar Residential Complex Inspired by Anti-Seismic Technologies

Authors: Sara Hadad Dabaghi

Abstract:

Iran is among the first five earthquake prone regions of the world. During the past 90 years, more than 85 catastrophic earthquakes have happened in Iran, leaving approximately 120000 casualties. Therefore, it is necessary to apply modern anti-seismic technologies to the construction of building such earthquake prone zones. This is especially the case with the northern regions of this country where the existence Khazar and Alborz Faults necessitate the observation of building construction security. Thus, the goal of this research is to solve this problem and to design earthquake resistant buildings. The present study is descriptive-analytical carried out on a mixed method platform. The study focuses on designing Roudbar Residential Complex adopting an anti-seismic approach. It is a cross-sectional applied research since its findings could be used to solve the security problems of Roudbar building with respect to earthquakes of the regions. The causality relationship in this research could be formulated as follows: the novel anti-seismic technologies increase security and reduce damages caused by earthquakes.

Keywords: design, residential complex, inspiration, anti-seismic technology, Roudbar

Procedia PDF Downloads 289
6823 Cloud Computing: Major Issues and Solutions

Authors: S. Adhirai Subramaniyam, Paramjit Singh

Abstract:

This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.

Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security

Procedia PDF Downloads 339
6822 Localization Problem in Optical Fiber Sensors

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The security industry is making many efforts to lower the costs of system installation. However, the dominant technique is the application of fiber optic sensors. It is necessary to determine the location of the disorder of long optical fiber cables. For a number of years, many research centers developed their own solutions. The article presents the construction of the sensor systems with the possibility of disorder location. We present a methodology for determining location of the disorder. The aim of investigations is to answer the question of which of optical sensor configuration offer the best performance for location of the disorder.

Keywords: fiber optic sensor, security sensor, fiber cables, system instillation

Procedia PDF Downloads 630
6821 Occurence And Management Of Coliform Bacteria On Tomatoes

Authors: Cho Achidi

Abstract:

Tomato is a crucial food crop significantly contributes to global food and nutrition security. However, postharvest losses severely limit its role. Therefore, it is necessary to develop sustainable strategies to minimize these losses and improve the shelf-life of tomato fruits. One of the major concerns is bacterial infections, particularly by faecal coliform bacteria, which can cause food poisoning and illnesses like diarrhoea and dysentery. This study seeks to identify the presence of coliform bacteria on tomato fruits in fields and markets in Muea, Buea Municipality. The study also evaluated different management strategies to reduce the bacterial incidence and load on tomato fruits. A total of 200 fruits were sampled for both the coliform survey and shelf-life analysis. Ten farmers and traders provided samples, including asymptomatic and symptomatic tomato fruits. The samples designated for shelf-life analysis were treated with Aquatab, warm water, lemon, and onion. The results indicated that out of the 80 symptomatic samples collected, 12.5% contained faecal and total coliform species. Among the ten farms sampled, 14% were infected with coliform bacteria, with the highest infestation rate of 60% recorded in field 4. Furthermore, 15% of the asymptomatic tomato fruits were found to be infected by coliform bacteria. Regarding the management strategies, Aquatabs exhibited the highest efficacy in reducing the incidence of coliform bacteria on tomato fruits, followed by onion and lemon extracts. Although hot water treatment effectively removed bacteria from the fruits, damaging the cell wall negatively affected their shelf-life. Overall, this study emphasizes the severity of coliform bacterial pathogens in the Muea area, particularly their occurrence on asymptomatic tomatoes, which poses a significant concern for plant quarantine services. It also demonstrates potential options for mitigating this bacterial challenge.

Keywords: tomato, shelf-life analysis, food and nutrition security, coliform bbacteria

Procedia PDF Downloads 62
6820 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 252
6819 Changing Landscape of International Law of Governance: ‘One Belt One Road Initiative’ as a Case Study

Authors: Tikumporn Rodkhunmuang

Abstract:

The importance of ‘international law of governance’ is the means and end to deal with international affairs. This research paper seeks to first study the historical development of international law of governance from the classical period of the international legal framework of global governance until the contemporary period of its framework. Second, the international law of governance is extremely turning into the crucial point in its long history because of the changing of China's foreign policies towards ‘One Belt One Road Initiative’. Third, the proposing model of the existing international law of governance within Chinese characteristics will be the new rules and modalities of modern diplomacy and governed international affairs. Methodologically speaking, this research paper is conducting under mixed methods research, which are also included numerical analysis and theoretical considerations. As a result, this research paper is the critical point of the international legal framework of global governance that changing the diplomatic paradigm as well as turning China into a great-power in international politics. So, this research paper is useful for international legal scholars and diplomats for slightly changing their understanding of the rapidly changing their norms from western norms to the eastern norms of international law. Therefore, the outcome of the research is the modern model of China to make a diplomatic relationship with other countries in the global society.

Keywords: global governance, international law, landscape, one belt one road

Procedia PDF Downloads 185
6818 Solar Radiation Studies and Performance of Solar Panels for Three Cities of Sindh, Pakistan

Authors: M. A. Ahmed, Sidra A. Shaikh, M. W. Akhtar

Abstract:

Solar radiation on horizontal surface over three southern cities of Sindh, namely Karachi, Hyderabad and Nawabshah has been investigated to asses the feasibility of solar energy application for power generation. In the present work, measured data of bright sunshine hour of the region have been used to estimate the global and diffuse solar radiation. The regression coefficient 'a' and 'b' have been calculated using first order Angstrom type co-relation. The result obtained shows that the contribution of direct solar radiation is low and diffuse radiation is high during the monsoon months July and August for Karachi and Hyderabad. The sky remains clear from September to June, whereas for Nawabshah the global radiation remains high throughout the year. The potential of grid quality solar photovoltaic power in Karachi is estimated for 10 square meter area of solar panel.

Keywords: solar potential over Sindh, global and diffuse solar radiation, radiation over three cities of Sindh, solar panels

Procedia PDF Downloads 440
6817 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 161
6816 Email Based Global Automation with Raspberry Pi and Control Circuit Module: Development of Smart Home Application

Authors: Lochan Basyal

Abstract:

Global Automation is an emerging technology of today’s era and is based on Internet of Things (IoT). Global automation deals with the controlling of electrical appliances throughout the world. The fabrication of this system has been carried out with interfacing an electrical control system module to Raspberry Pi. An electrical control system module includes a relay driver mechanism through which appliances are controlled automatically in respective condition. In this research project, one email ID has been assigned to Raspberry Pi, and the users from different location having different email ID can mail to Raspberry Pi on assigned email address “[email protected]” with subject heading “Device Control” with predefined command on compose email line. Also, a notification regarding current working condition of this system has been updated on respective user email ID. This approach is an innovative way of implementing smart automation system through which a user can control their electrical appliances like light, fan, television, refrigerator, etc. in their home with the use of email facility. The development of this project helps to enhance the concept of smart home application as well as industrial automation.

Keywords: control circuit, e-mail, global automation, internet of things, IOT, Raspberry Pi

Procedia PDF Downloads 162
6815 Contextualizing Household Food Security: A Comparison of Two Villages, Ambros and Maramanzhi, South Africa

Authors: Felicity Aphiwe Mkhongi, Walter Musakwa

Abstract:

Smallholder crop production is a defining factor in achieving food security, particularly at the household level. However, the number of abandoned arable fields is increasing in communal areas of South Africa. While substantial efforts have been devoted to addressing food insecurity in the country, ownership of arable land has not been supplemented with sustainable food production for households. This paper analyses household food security in the context of deagrarianization in two villages, Ambros (Eastern Cape) and Maramanzhi (Limpopo). Semi-structured questionnaires were administered to acquire both qualitative and quantitative data from 106 heads of households. The IBM SPSS Statistics 28.0 computer program was applied to complete data analysis. From the findings of the study, it was evident that compared to arable fields, a greater proportion of households own home-gardens with an average size of 2100m in Ambros and 3400m in Maramanzhi village. The majority of arable fields were abandoned, particularly in Ambros village. Household food access challenges were measured using the Household Food Insecurity Access Scale (HFIAS). This food security indicator revealed that the majority of households were mildly food insecure owing to food shortages emanating from insufficient monthly income and waning household crop production. Food was rated as a very important reason for engaging in cultivation in both villages of the study, but deagrarianization has eroded opportunities for increasing household crop production. Among other possible solutions, this study recommends that the government invest more in agriculture to allow for sustainable strategies that revive abandoned arable land, such as arable fields in communal areas of South Africa, as this could increase food production for households.

Keywords: cultivation, deagrarianization, food security, rural households, smallholder farmers

Procedia PDF Downloads 52
6814 A Study of the Impact of the Global Financial Crisis on the Financial Performance of Banks in Mauritius

Authors: Narvada Ramdhany, Reena Bhattu Babajee

Abstract:

The 2007-2008 Global Financial Crisis which initiated in the US had a global outreach, impacting the financial and banking sectors of several economies; such as European countries, developing and emerging countries in Asia, Latin America and Africa. European countries represent one of the main sources of export earnings for Mauritius and given that Europe has been quite profoundly affected by the crisis, the Mauritian economy also could have been negatively affected. This study is being undertaken to see if the crisis had a spill-over effect on the Mauritian banking system. It will also enable to determine if the measures put in place to counteract the crisis by regulatory authorities have been effective. The study will be carried out on 17 banks and data will be collected over a time frame of seven years; with a pre-crisis period from 2005 to 2007 and a post-crisis period from 2009 to 2011. The impact of the crisis as such will be measured through the financial performance of the banks, using financial ratios and regression analysis. The results show that during the period concerned Mauritian banks have remained solvent and relatively stable. One of the main explanations put forward to explain the resilience of the banking sector to the crisis is that foreign exposure was relatively low. Another explanation put forward is that Mauritian banks normally transact mainly with prime borrowers unlike most the banks which were affected by the financial crisis.  

Keywords: global financial crisis, banking sector, financial performance, Mauritian banks

Procedia PDF Downloads 434
6813 A Novel Software Model for Enhancement of System Performance and Security through an Optimal Placement of PMU and FACTS

Authors: R. Kiran, B. R. Lakshmikantha, R. V. Parimala

Abstract:

Secure operation of power systems requires monitoring of the system operating conditions. Phasor measurement units (PMU) are the device, which uses synchronized signals from the GPS satellites, and provide the phasors information of voltage and currents at a given substation. The optimal locations for the PMUs must be determined, in order to avoid redundant use of PMUs. The objective of this paper is to make system observable by using minimum number of PMUs & the implementation of stability software at 22OkV grid for on-line estimation of the power system transfer capability based on voltage and thermal limitations and for security monitoring. This software utilizes State Estimator (SE) and synchrophasor PMU data sets for determining the power system operational margin under normal and contingency conditions. This software improves security of transmission system by continuously monitoring operational margin expressed in MW or in bus voltage angles, and alarms the operator if the margin violates a pre-defined threshold.

Keywords: state estimator (SE), flexible ac transmission systems (FACTS), optimal location, phasor measurement units (PMU)

Procedia PDF Downloads 406
6812 Sea Border Dispute between Greece and Turkey in the Mediterrenean: Implications for Turkey’s Maritime Security and Its Military Spending

Authors: Aslihan Caliskan

Abstract:

The term Mediterranean comes from the Latin “mediterraneus” (Medius, "middle" plus Terra, "land, earth"). For the ancient Romans, the Mediterranean was the center of the earth as they knew it. The desire to gain control of the Mediterranean has led to disputes between many nations throughout history, some of which continue to this day. The recent major natural gas discoveries in the Mediterranean have aggravated ongoing tensions in some neighboring countries. The sea border dispute between Turkey and Greece & Greek-Cypriot side is one of the most critical conflicts in the Mediterranean Sea region. This unresolved dispute has many implications for all countries involved, as well as for third parties that have direct or indirect interests in the region. The research question of this context is what are the implications of this controversial sea border problem on the maritime security of Turkey and its military spending. In this paper, the quantitative method is used. Records from the Turkish Defense Ministry, data from the Turkish naval forces have been obtained. In addition, literature research and the United Nations Convention on the Law of the Sea (UNCLOS) application cases were evaluated, and an incident analysis was carried out. This research shows that the sea border dispute issue has a significant impact on the Turkish military both in terms of the structures required to ensure maritime and border security, as well as rising military costs and its macroeconomic implications. The paper begins with a brief overview of relevant principles and methods applied for delimiting th esea borders. The paper continues with a brief description and a background of the sea border dispute between Turkey and Greece & Greek-Cypriot side in the light of the United Nations Convention on the Law of the Sea (UNCLOS). An analysis of the implications of the dispute on Turkey’s maritime security and its military spending is provided in the following chapters. The paper ends with concluding remarks of the author, including suggestions for the way forward.

Keywords: sea border security, mediterranean sea, greece-turkey dispute, limitation of sea, united nations convention on the law of the sea (UNCLOS)

Procedia PDF Downloads 182
6811 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 195
6810 Ethical Aspects of the Anti-Doping System Management in Poland and in Global Framework

Authors: Malgorzata Kurleto

Abstract:

This study is trying to analyse the organization of the anti-doping system globally (particularly in Poland). The analysis is going to show the concept of doping, indicating the types of doping, and list of banned substances and methods. The paper discusses ethical aspects of the global anti-doping system. The analysis is focusing on organization of global Anti-Doping Agency. The paper will try to describe the basic assumptions of regulations adopted by WADA, called "standards” as well organization and functioning of the Polish Anti-Doping Agency (including the legal basis: POLADA). The base for this discuss will be the Polish 2018 annual report, which shows the most important assumptions, implementation and the number of anti-doping proceedings conducted in Poland. The aim of this paper is to show ethical arguments on anti-doping management strategies.

Keywords: anti-doping, ethical dilemmas, sports doping, WADA, POLADA

Procedia PDF Downloads 124
6809 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 65
6808 A Comparative Analysis of Global Minimum Variance and Naïve Portfolios: Performance across Stock Market Indices and Selected Economic Regimes Using Various Risk-Return Metrics

Authors: Lynmar M. Didal, Ramises G. Manzano Jr., Jacque Bon-Isaac C. Aboy

Abstract:

This study analyzes the performance of global minimum variance and naive portfolios across different economic periods, using monthly stock returns from the Philippine Stock Exchange Index (PSEI), S&P 500, and Dow Jones Industrial Average (DOW). The performance is evaluated through the Sharpe ratio, Sortino ratio, Jensen’s Alpha, Treynor ratio, and Information ratio. Additionally, the study investigates the impact of short selling on portfolio performance. Six-time periods are defined for analysis, encompassing events such as the global financial crisis and the COVID-19 pandemic. Findings indicate that the Naive portfolio generally outperforms the GMV portfolio in the S&P 500, signifying higher returns with increased volatility. Conversely, in the PSEI and DOW, the GMV portfolio shows more efficient risk-adjusted returns. Short selling significantly impacts the GMV portfolio during mid-GFC and mid-COVID periods. The study offers insights for investors, suggesting the Naive portfolio for higher risk tolerance and the GMV portfolio as a conservative alternative.

Keywords: portfolio performance, global minimum variance, naïve portfolio, risk-adjusted metrics, short-selling

Procedia PDF Downloads 90
6807 Heritage and the Sustainable Development Goals: Successful Practices and Lessons Learnt from the Uk’s Global Challenges Research Fund and Newton Research Portfolios

Authors: Francesca Giliberto

Abstract:

Heritage and culture, in general, plays a central role in addressing the complexity and broad variety of global development challenges, ranging from environmental degradation and refugee and humanitarian crisis to extreme poverty, food insecurity, persisting inequalities, and unsustainable urbanisation, just to mention some examples. Nevertheless, the potential of harnessing heritage to address global challenges has remained largely under-represented and underestimated in the most recent international development agenda adopted by the United Nations in 2015 (2030 Agenda). Among the 17 sustainable development goals (SDGs) and 169 associated targets established, only target 11.4 explicitly mentions heritage, stating that efforts should be strengthened “to protect and safeguard the world’s cultural and natural heritage in order to make our cities safe, resilient, and sustainable”. However, this global target continues to reflect a rather limited approach to heritage for development. This paper will provide a critical reflection on the contribution that using (tangible and intangible) heritage in international research can make to tackling global challenges and supporting the achievement of all the SDGs. It will present key findings and insights from the heritage strand of PRAXIS, a research project from the University of Leeds, which focuses on Arts and Humanities research across 300+ projects funded through the Global Challenges Research Fund and Newton Fund. In particular, this paper will shed light on successful practices and lessons learned from 87 research projects funded through the Global Challenges Research Fund and Newton Fund portfolios in 49 countries eligible for Official Development Assistance (ODA) between 2014 and 2021. Research data were collected through a desk assessment of project data available on UKRI Gateway to Research, online surveys, and qualitative interviews with research principal investigators and partners. The findings of this research provide evidence of how heritage and heritage research can foster innovative, interdisciplinary, inclusive, and transformative sustainable development and the achievement of the SDGs in ODA countries and beyond. This paper also highlights current challenges and research gaps that still need to be overcome to rethink current approaches and transform our development models to be more integrated, human-centred, and sustainable.

Keywords: global challenges, heritage, international research, sustainable development

Procedia PDF Downloads 72
6806 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics

Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky

Abstract:

With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.

Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities

Procedia PDF Downloads 162
6805 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 394
6804 Modeling Vegetation Phenological Characteristics of Terrestrial Ecosystems

Authors: Zongyao Sha

Abstract:

Green vegetation plays a vital role in energy flows and matter cycles in terrestrial ecosystems, and vegetation phenology may not only be influenced by but also impose active feedback on climate changes. The phenological events of vegetation, such as the start of the season (SOS), end of the season (EOS), and length of the season (LOS), can respond to climate changes and affect gross primary productivity (GPP). Here we coupled satellite remote sensing imagery with FLUXNET observations to systematically map the shift of SOS, EOS, and LOS in global vegetated areas and explored their response to climate fluctuations and feedback on GPP during the last two decades. Results indicated that SOS advanced significantly, at an average rate of 0.19 days/year at a global scale, particularly in the northern hemisphere above the middle latitude (≥30°N) and that EOS was slightly delayed during the past two decades, resulting in prolonged LOS in 72.5% of the vegetated area. The climate factors, including seasonal temperature and precipitation, are attributed to the shifts in vegetation phenology but with a high spatial and temporal difference. The study revealed interactions between vegetation phenology and climate changes. Both temperature and precipitation affect vegetation phenology. Higher temperature as a direct consequence of global warming advanced vegetation green-up date. On the other hand, 75.9% and 20.2% of the vegetated area showed a positive correlation and significant positive correlation between annual GPP and length of vegetation growing season (LOS), likely indicating an enhancing effect on vegetation productivity and thus increased carbon uptake from the shifted vegetation phenology. Our study highlights a comprehensive view of the vegetation phenology changes of the global terrestrial ecosystems during the last two decades. The interactions between the shifted vegetation phenology and climate changes may provide useful information for better understanding the future trajectory of global climate changes. The feedback on GPP from the shifted vegetation phenology may serve as an adaptation mechanism for terrestrial ecosystems to mitigate global warming through improved carbon uptake from the atmosphere.

Keywords: vegetation phenology, growing season, NPP, correlation analysis

Procedia PDF Downloads 97
6803 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 293
6802 Revisiting Politics of Religion in Muslim Republics of Former Soviet Union and Rise of Extremism, Global Jihadi Terrorism

Authors: Etibar Guliyev

Abstract:

The breakdown of the Soviet Union in 1991 has led to a considerable rise in the religious self-consciousness of Muslim population of the Central Asia. Additionally, huge amount of money spent by various states further facilitated the spread of religious ideas. According to some sources, Saudi Arabia spent 87 billion dollars to propagate Wahhabism abroad during two decades, whereas the Communist Party of the Soviet Union spent just over 7 billion dollars to spread its ideology worldwide between 1921 and 1991. As the result, today once a remote area from international politics has turned into third major source of recruitment of fighters for global terrorist organizations. In order to illustrate to scope of the involvement of the Central Asian residents in international terrorist networks it is enough to mention the name of Colonel Gulmorod Khalimov, the former head of the Tajik special police forces who served as ISIS war minister between 2016 and 2017. The importance of the topic stems from the fact that the above-mentioned republics with a territory of 4 million square km and the population of around 80 million people borders Russia, Iran Afghanistan and China. Moreover, the fact that political and military activities motivated with religious feelings in those countries have implications not only for domestic but also for regional and global political relations and all of them has root in politics of religions adds value to the research. This research aims to provide an in-depth analyses of the marked features of the state policies to regulate religious activities and approach this question both from individual, domestic, regional and global levels of analyses. The research will enable us to better understand what implications have the state of religious freedom in post-Soviet Muslim republics for international relations and the rise of global jihadi terrorism. The paper tries to find a linkage between the mentioned terror attacks and underground rise of religious extremism in Central Asia. This research is based on multiple research methods, mainly on qualitative one. The process tracing method is also employed to review religious policies implemented from 1918-1991 and after the collapse of the Soviet Union in a chronological way. In terms of the quantitative method, it chiefly will be used in a bid to process various statistics disseminated in academic and official sources. The research mostly explored constructivist, securitization and social movement theories. Findings of the research suggests that the endemic problems peculiar to authoritarian regimes of Central Asia such as crackdown on the expression of religious believe and any kind of opposition, economic decline, instrumental use of religion and corruption and tribalism further accelerated the recruitment problem. Paper also concludes that the Central Asian states in some cases misused counter-terrorism campaign as a pretext to further restrict freedom of faith in their respective countries.

Keywords: identity, political Islam, religious extremism, security, terrorism

Procedia PDF Downloads 264
6801 CO2 Sequestration for Enhanced Coal Bed Methane Recovery: A New Approach

Authors: Abhinav Sirvaiya, Karan Gupta, Pankaj Garg

Abstract:

The global warming due to the increased atmospheric carbon dioxide (CO2) concentration is the most prominent issue of environment that the world is facing today. To solve this problem at global level, sequestration of CO2 in deep and unmineable coal seams has come out as one of the attractive alternatives to reduce concentration in atmosphere. This sequestration technology is not only going to help in storage of CO2 beneath the sub-surface but is also playing a major role in enhancing the coal bed methane recovery (ECBM) by displacing the adsorbed methane. This paper provides the answers for the need of CO2 injection in coal seams and how recovery is enhanced. We have discussed the recent development in enhancing the coal bed methane recovery and the economic scenario of the same. The effect of injection on the coal reservoir has also been discussed. Coal is a good absorber of CO2. That is why the sequestration of CO2 is emerged out to be a great approach, not only for storage purpose but also for enhancing coal bed methane recovery.

Keywords: global warming, carbon dioxide (CO2), CO2 sequestration, enhance coal bed methane (ECBM)

Procedia PDF Downloads 499