Search results for: national security strategy
9341 Terrorism: Definition, History and Different Approaches in the Analysis of Terrorism Phenomenon
Authors: Shabnam Dadparvar, Laijin Shen, Farzad Ravanbod
Abstract:
Nowadays, the political phenomenon of terrorism is considered as an effective factor on political, social, and economic changes. It has replaced the recognized political phenomena such as revolutions, wars (total war among two or more political units with distinct identities in the form of national states), coups d’état, insurgencies and etc. and has challenged political life in all its levels (sub national, national, and international political groups). In this paper by using descriptive-analytical method, the authors try to explain the spread of this political phenomenon across the world, its definition and types, also analyze different approaches to understand it. The authors believe that the Logical-Rational approach is the best way to explain and understand this phenomenon.Keywords: logical approach, psychological- social approach, religious approach, terrorism
Procedia PDF Downloads 3359340 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement
Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al
Abstract:
Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security
Procedia PDF Downloads 1289339 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture
Authors: Mirad Böhm, Diede De Kok
Abstract:
It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder
Procedia PDF Downloads 3319338 Energy Management of Hybrid Energy Source Composed of a Fuel Cell and Supercapacitor for an Electric Vehicle
Authors: Mejri Achref
Abstract:
This paper proposes an energy management strategy for an electrical hybrid vehicle which is composed of a Proton Exchange Membrane (PEM) fuel cell and a supercapacitor storage device. In this paper, the mathematical model for the proposed power train, comprising the PEM Fuel Cell, supercapacitor, boost converter, inverter, and vehicular structure, was modeled in MATLAB/Simulink. The proposed algorithm is evaluated for the Highway Fuel Economy Test (HWFET) driving cycle. The obtained results demonstrate the effectiveness of the proposed energy management strategy in reduction of hydrogen consumption.Keywords: proton exchange membrane fuel cell, hybrid vehicle, hydrogen consumption, energy management strategy
Procedia PDF Downloads 1789337 A Novel Fuzzy Second-Order Sliding Mode Control of a Doubly Fed Induction Generator for Wind Energy Conversion
Authors: Elhadj Bounadja, Mohand Oulhadj Mahmoudi, Abdelkader Djahbar, Zinelaabidine Boudjema
Abstract:
In this paper we present a novel fuzzy second-order sliding mode control (FSOSMC) for wind energy conversion system based on a doubly-fed induction generator (DFIG). The proposed control strategy combines a fuzzy logic and a second-order sliding mode for the DFIG control. This strategy presents attractive features such as chattering-free, compared to the conventional first and second order sliding mode techniques. The use of this method provides very satisfactory performance for the DFIG control. The overall strategy has been validated on a 1.5-MW wind turbine driven a DFIG using the Matlab/Simulink.Keywords: doubly fed induction generator, fuzzy second-order sliding mode controller, wind energy
Procedia PDF Downloads 5499336 Analysing the Cost of Immigrants to the National Health System in Eastern Macedonia and Thrace
Authors: T. Theodosiou, P. Polychronidou, A. G. Karasavvoglou
Abstract:
The latest years the number of immigrants at Greece has increased dramatically. Their impact on the National Health System (NHS) has not been yet thoroughly investigated. This paper analyses the cost of immigrants to the NHS hospitals of the region of Eastern Macedonia and Thrace. The data are collected from 2005 to 2011 from five different hospitals and are analysed using linear mixed effects models in order to investigate the effects of nationality and year on the cost of hospitalization and treatment. The results show that generally the Greek nationality patients have a higher mean cost of hospitalization compared to the immigrants and that there is an increasing trend for the cost except for the year 2010.Keywords: cost, Eastern Macedonia and Thrace, immigrants, national health system
Procedia PDF Downloads 2459335 Efficacy of Self-Assessment Metacognitive Strategy on Academic Performance Among Upper Basic Students in Ankpa, Kogi State, Nigeria
Authors: Daodu Joshua Rotimi
Abstract:
This study investigated the Efficacy of Self-Assessment Metacognitive Strategy on Academic performance in Energy Concepts among Upper Basic Science Students in Ankpa, Kogi State, Nigeria. The research design adopted for the study was a Quasi-experimental control group design which employed a pretest, posttest of the experimental and control groups. The population of the study consisted of one hundred and twenty-four (124) JSSII Students; sixty-five (65) for the experimental group and (59) for the control group. The instrument used for the study was the Energy Concept Performance Test (ECPT), with a reliability coefficient of 0.80. Two research questions were answered using descriptive statistics of mean and standard deviation, while two hypotheses were tested using a t-test at P≤0.05 level of significance. The findings of the study revealed that the use of the Self-Assessment Metacognitive Strategy has a positive effect on students’ performance in energy concepts among upper Basic Science Students leading to high academic performance; also, there is no significant difference in the mean Academic Performance scores between Male and Female students taught Energy Concept using Self-Assessment Metacognitive Strategy. Based on the research findings, recommendations were made, which include that Secondary school teachers should be encouraged the use Self-Assessment Metacognitive strategy so as to make the learning process attractive, interactive and enriching to the learners.Keywords: metacognition, self-assessment, performance, efficacy
Procedia PDF Downloads 1239334 Manipulative Figurative Linguistic Violence of Contemporary National Anthems: A Socio-Cognitive Critical Discourse Analysis
Authors: Samson Olasunkanmi Oluga, Teh Chee Send, Gerard Sagaya Raj Rajo
Abstract:
It is ironical that the national anthems of many nations that are in the forefront of the global condemnation of violence of all forms have portions or expressions that propagate various forms of linguistic violence which advocate attacking opponents, going to war, shedding blood and sacrificing lives. These diametrically contradict contemporary yearnings for global tranquility and the ideals of the United Nations established for the maintenance of international peace and harmony aimed at making the world a safe haven for all and sundry. The linguistic violence of many national anthems is manipulatively constructed /presented via the instrumentality of the figurative or rhetorical language. This helps to linguistically embellish the violent ideas communicated and makes them sound somehow better or logical to the target audience with the intention of cognitively manipulating them to accept or rationalize such violent ideas. This paper, therefore, presents the outcome of a linguistic exploration/examination of national anthems which reveals elements or cases manipulative figurative linguistic violence in the anthems of twenty-one (21) nations. The paper details a Socio-Cognitive Critical Discourse Analysis of the manipulative figures of comparison, contrast, indirectness, association and sound used to convey the linguistic violence of the identified national anthems. Finally, the paper advocates the need for linguistic overhaul of affected anthems so that the language of anthems which epitomize nations can be pacific and in tandem with contemporary global trends.Keywords: national anthems, linguistic violence, figurative language, cognitive, manipulation, CDA
Procedia PDF Downloads 3329333 Use of External Sensory Stimuli in the Treatment of Parkinson Disease: Literature Review
Authors: Hadi O. Tohme
Abstract:
This study is a review on the effectiveness of new physiotherapy techniques with external sensory stimulus compared to standard physiotherapy in the daily activities of patients with Parkinson's disease. Twenty studies from 1996 to 2015 were analyzed and discussed in this review, using the rehabilitation strategy with external sensory stimulus evaluating walking, freezing episodes, balance, transfers, and daily activities of parkinsonian patients. The study highlights the effectiveness of the variety of rehabilitation with cueing strategy used in the treatment of Parkinson's disease. Based on the literature review completed, there is a need for more specific trials with better treatment strategies to support the most appropriate choice of physiotherapy intervention using external sensory stimulus to the type and frequency of this stimulus. In addition, no trials examined the long-term benefits of the physiotherapy intervention with the external sensory stimulus. In order to determine if, or how long the improvements due to the external sensory stimulus physiotherapy intervention can last, long-term follow-up should be performed.Keywords: cueing strategy, external sensory stimulus, parkinson disease, rehabilitation for parkinson, sensory attention focused exercises, sensory strategy reeducation
Procedia PDF Downloads 2539332 Studying the Influence of Logistics on Organizational Performance through a Supply Chain Strategy: Case Study in Goldiran Electronics Co.
Authors: Ali Hajiesmaeili, Mehdi Rahimi, Ehsan Jaberi, Amir Abbas Hosseini
Abstract:
The purpose of this study is investigating the influences of logistics performance on organizational performance including both marketing & financial aspects, and showing the financial impacts of selecting the right marketing and logistics priorities in line with their supply chain type, and also giving the practitioners an advance identification of their priorities and participation types of supply chain, and the best combination of their strategies and resources in this regard. We made use of the original model’s questionnaire to gather all expert’s data and also SPSS and AMOS Ver.22 to analyze the gathered data. CFA method was also used to test whether a relationship between observed variables and their underlying latent constructs exists. Supply chain strategy implementation leads to logistics performance improvement, and marketing performance will be affected as well. Logistics service providers should focus on enhancement of supply chain performance, since logistics performance has been considered as a basis of evaluation of supply chain management strategy. Consequently, performance of the organization will be enhanced. This case is the first research made in Iran that analyzes the relationship between Logistics & Organizational performance in Home Appliances and Home Entertainment companies.Keywords: logistics, organizational, performance, supply chain, strategy
Procedia PDF Downloads 6499331 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation
Procedia PDF Downloads 3839330 The Elimination of Fossil Fuel Subsidies from the Road Transportation Sector and the Promotion of Electro Mobility: The Ecuadorian Case
Authors: Henry Gonzalo Acurio Flores, Alvaro Nicolas Corral Naveda, Juan Francisco Fonseca Palacios
Abstract:
In Ecuador, subventions on fossil fuels for the road transportation sector have always been part of its economy throughout time, mainly because of demagogy and populism from political leaders. It is clearly seen that the government cannot maintain the subsidies anymore due to its commercial balance and its general state budget; subsidies are a key barrier to implementing the use of cleaner technologies. However, during the last few months, the elimination of subsidies has been done gradually with the purpose of reaching international prices. It is expected that with this measure, the population will opt for other means of transportation, and in a certain way, it will promote the use of private electric vehicles and public, e.g., taxis and buses (urban transport). Considering the three main elements of sustainable development, an analysis of the social, economic, and environmental impacts of eliminating subsidies will be generated at the country level. To achieve this, four scenarios will be developed in order to determine how the subsidies will contribute to the promotion of electro-mobility. 1) A Business as Usual BAU scenario; 2) the introduction of 10 000 electric vehicles by 2025; 3) the introduction of 100 000 electric vehicles by 2030; 4) the introduction of 750 000 electric vehicles by 2040 (for all the scenarios buses, taxis, lightweight duty vehicles, and private vehicles will be introduced, as it is established in the National Electro Mobility Strategy for Ecuador). The Low Emissions Analysis Platform (LEAP) will be used, and it will be suitable to determine the cost for the government in terms of importing derivatives for fossil fuels and the cost of electricity to power the electric fleet that can be changed. The elimination of subventions generates fiscal resources for the state that can be used to develop other kinds of projects that will benefit Ecuadorian society. It will definitely change the energy matrix, and it will provide energy security for the country; it will be an opportunity for the government to incentivize a greater introduction of renewable energies, e.g., solar, wind, and geothermal. At the same time, it will also reduce greenhouse gas emissions (GHG) from the transportation sector, considering its mitigation potential, which as a result, will ameliorate the inhabitant quality of life by improving the quality of air, therefore reducing respiratory diseases associated with exhaust emissions, consequently, achieving sustainability, the Sustainable Development Goals (SDGs), and complying with the agreements established in the Paris Agreement COP 21 in 2015. Electro mobility in Latin America and the Caribbean can only be achieved by the implementation of the right policies at the central government, which need to be accompanied by a National Urban Mobility Policy (NUMP) and can encompass a greater vision to develop holistic, sustainable transport systems at local governments.Keywords: electro mobility, energy, policy, sustainable transportation
Procedia PDF Downloads 849329 Synopsis of Izmir Regional Plan and Interpretations about Tourism in Izmir
Authors: Yakin Ekin, Onur Akbulut
Abstract:
This study aims not only to create a summarized background for the effective and efficient use of the potential of Izmir by providing the strategic planning works and institutional and sectoral strategy documents with different purposes realized by all relevant institutions and organizations in Izmir and Aegean Region to steer towards the same priorities and aims, but also focuses on a criticism and comparison viewpoint about tourism sector in Izmir.Keywords: regional plan, Izmir, tourism, sectoral strategy
Procedia PDF Downloads 4519328 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model
Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek
Abstract:
Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.Keywords: optimum balance model, knowledge management, security environment, supporting peace
Procedia PDF Downloads 3989327 Exploring the Efficacy of Context-Based Instructional Strategy in Fostering Students Achievement in Chemistry
Authors: Charles U. Eze, Joy Johnbest Egbo
Abstract:
The study investigated the effect of Context-Based Instructional Strategy (CBIS) on students’ achievement in chemistry. CBIS was used as an experimental group and expository method (EM) as a control group, sources showed that students poor achievement in chemistry is from teaching strategy adopted by the chemistry teachers. Two research questions were answered, and two null hypotheses were formulated and tested. This strategy recognizes the need for student-centered, relevance of tasks and students’ voice; it also helps students develop creative and critical learning skills. A quasi-experimental (non-equivalent, pretest, posttest control group) design was adopted for the study. The population for the study comprised all senior secondary class one (SSI) students who were offering chemistry in co-education schools in Agbani Education zone. The instrument for data collection was a self-developed Basic Chemistry Achievement Test (BCAT). Relevant data were collected from a sample of SSI chemistry students using purposive random sampling techniques from two co-education schools in Agbani Education Zone of Enugu State, Nigeria. A reliability co-efficient was obtained for the instrument using Kuder-Richardson formula 20. Mean and standard deviation scores were used to answer the research questions while two-way analysis of covariance (ANCOVA) was used to test the hypotheses. The findings showed that the experimental group taught with context-based instructional strategy (CBIS) obtained a higher mean achievement score than the control group in the post BCAT; male students had higher mean achievement scores than their female counterparts. The difference was significant. It was recommended, among others, that CBIS should be given more emphasis in the training and re-training program of secondary school chemistry teachers.Keywords: context-based instructional strategy, expository strategy, student-centered
Procedia PDF Downloads 2299326 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4069325 Toward a New Approach for Modeling Lean, Agile and Leagile Supply Chains
Authors: Bouchra Abdelilah, Akram El Korchi, Atmane Baddou
Abstract:
With the very competitive business era that we witness nowadays, companies needs more that anytime to use all the resources they have in order to maximize performance and satisfy the customers’ needs. The changes occurring in the market business are often due to the variations of demand, which requires a very specific supply chain strategy. Supply chains aims to balance cost, quality, and service level and lead time. Still, managers are confused when faced with the strategies working the best for the supply chain: lean, agile and leagile. This paper presents a decision making tool that aims to assist the manager in choosing the supply chain strategy that suits the most his business, depending on the type of product and the nature of demand. Analyzing the different characteristics of supply chain will enable us to guide the manager to the suitable strategy between lean, agile and leagile.Keywords: supply chain, lean, agile, flexibility, performance
Procedia PDF Downloads 8599324 Gender Difference and Conflict Management Strategy Preference among Managers in Public Organizations in South-Western Nigeria
Authors: D. I. Akintayo, C. O. Aje
Abstract:
This study investigated the moderating influence of gender difference and conflict resolution strategy preference on managers` efficiency in managing industrial conflict in work organizations in South-Western Nigeria. This was for the purpose of ascertaining the relevance of gender difference and conflict resolution strategy preference to managerial efficiency towards ensuring sustainable industrial peace and harmonious labour-management relations at workplaces in Nigeria. Descriptive ex-post-facto research design was adopted for the study. A total of 185 respondents were selected for the study using purposive stratified sampling technique. A set of questionnaire titled ‘Rahim Organizational Conflict Inventory’ (ROCI) and Managerial Conflict Efficiency Scale (MCES) were adopted for the study. The three generated hypotheses were tested using Pearson Product Moment Correlation and t-test statistical methods. The findings of the study revealed that: A significant relationship exists between gender difference and conflict management preference of the managers(r = 0.644; P < 0.05). I t was also found that there was no significant difference between male and female managers’ conflict management strategy preference (t (181) = 11.08; P > 0.05).The finding reveals that there is no significant difference between female and male managers’ conflict management efficiency on the basis of conflict management preference of the managers (t (181) = 10.23; P > 0.05). Based on the findings of the study, it is recommended that collective bargaining strategy should be encouraged as conflict resolution strategy in order to guarantee effective management of industrial conflict and harmonious labour-management relations. Also, both male and female managers should be empowered to be appointed to managerial positions and should avoid the use of coercion, competition, aggressiveness and pro-task in the course of managing industrial conflict. Rather, persuasion, compromising, relational, lobbying and participatory approaches should be employed during collective bargaining process in order to foster effective management of conflict at workplaces.Keywords: conflict management, gender difference, managerial studies, public organization and managers, strategy preference
Procedia PDF Downloads 4599323 A Systematic Mapping of the Use of Information and Communication Technology (ICT)-Based Remote Agricultural Extension for Women Smallholders
Authors: Busiswa Madikazi
Abstract:
This systematic mapping study explores the underrepresentation of women's contributions to farming in the Global South within the development of Information and Communication Technologies (ICT)-based extension methods. Despite women farmers constituting 70% of the agricultural labour force, their productivity is hindered by various constraints, including illiteracy, household commitments, and limited access to credit and markets. A systematic mapping approach was employed with the aim of identifying evidence gaps in existing ICT extension for women farmers. The data collection protocol follows a structured approach, incorporating key criteria for inclusion, exclusion, search strategy, and coding and the PICO strategy (Population, Intervention, Comparator, and Outcome). The results yielded 119 articles that qualified for inclusion. The findings highlight that mobile phone apps (WhatsApp) and radio/television programming are the primary extension methods employed while integrating ICT with training, field visits, and demonstrations are underutilized. Notably, the study emphasizes the inadequate attention to critical issues such as food security, gender equality, and attracting youth to farming within ICT extension efforts. These findings indicate a significant policy and practice gap, neglecting community-driven approaches that cater to women's specific needs and enhance their agricultural production. Map highlights the importance of refocusing ICT extension efforts to address women farmers’ unique challenges, thereby contributing to their empowerment and improving agricultural practices.Keywords: agricultural extension, ICT, women farmers, smallholders
Procedia PDF Downloads 639322 Democracy and Security Challenge in Nigeria, 1999, Till Date
Authors: Abdulsalami M. Deji
Abstract:
Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.Keywords: democracy, interest, militia, security
Procedia PDF Downloads 3359321 Agroforestry Systems: A Sustainable Strategy of the Agricultural Systems of Cumaral (Meta), Colombia
Authors: Amanda Silva Parra, Dayra Yisel García Ramirez
Abstract:
In developing countries, agricultural "modernization" has led to a loss of biodiversity and inefficiency of agricultural systems, manifested in increases in Greenhouse Gas Emissions (GHG) and the C footprint, generating the susceptibility of systems agriculture to environmental problems, loss of biodiversity, depletion of natural resources, soil degradation and loss of nutrients, and a decrease in the supply of products that affect food security for peoples and nations. Each year agriculture emits 10 to 12% (5.1 to 6.1 Gt CO2eq per year) of the total estimated GHG emissions (51 Gt CO2 eq per year). The FAO recommends that countries that have not yet done so consider declaring sustainable agriculture as an essential or strategic activity of public interest within the framework of green economies to better face global climate change. The objective of this research was to estimate the balance of GHG in agricultural systems of Cumaral, Meta (Colombia), to contribute to the recovery and sustainable operation of agricultural systems that guarantee food security and face changes generated by the climate in a more intelligent way. To determine the GHG balances, the IPCC methodologies were applied with a Tier 1 and 2 level of use. It was estimated that all the silvopastoral systems evaluated play an important role in this reconversion compared to conventional systems such as improved pastures. and degraded pastures due to their ability to capture C both in soil and in biomass, generating positive GHG balances, guaranteeing greater sustainability of soil and air resources.Keywords: climate change, carbon capture, environmental sustainability, GHG mitigation, silvopastoral systems
Procedia PDF Downloads 1189320 Exploring the Compatibility of The Rhizome and Complex Adaptive System (CAS) Theory as a Hybrid Urban Strategy Via Aggregation, Nonlinearity, and Flow
Authors: Sudaff Mohammed, Wahda Shuker Al-Hinkawi, Nada Abdulmueen Hasan
Abstract:
The compatibility of the Rhizome and Complex Adaptive system theory as a strategy within the urban context is the essential interest of this paper since there are only a few attempts to establish a hybrid, multi-scalar, and developable strategy based on the concept of the Rhizome and the CAS theory. This paper aims to establish a Rhizomic CAS strategy for different urban contexts by investigating the principles, characteristics, properties, and mechanisms of Rhizome and Complex Adaptive Systems. The research focused mainly on analyzing three properties: aggregation, non-linearity, and flow through the lens of Rhizome, Rhizomatization of CAS properties. The most intriguing result is that the principal and well-investigated characteristics of Complex Adaptive systems can be ‘Rhizomatized’ in two ways; highlighting commonalities between Rhizome and Complex Adaptive systems in addition to using Rhizome-related concepts. This paper attempts to emphasize the potency of the Rhizome as an apparently stochastic and barely anticipatable structure that can be developed to analyze cities of distinctive contexts for formulating better customized urban strategies.Keywords: rhizome, complex adaptive system (CAS), system Theory, urban system, rhizomatic CAS, assemblage, human occupation impulses (HOI)
Procedia PDF Downloads 429319 An E-Retailing System Architecture Based on Cloud Computing
Authors: Chanchai Supaartagorn
Abstract:
E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.Keywords: architecture, cloud computing, e-retailing, internet-based
Procedia PDF Downloads 3969318 Computer-Based versus Paper-Based Tests: A Comparative Study of Two Types of Indonesian National Examination for Senior High School Students
Authors: Faizal Mansyur
Abstract:
The objective of this research is to find out whether there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based tests. The population of this research is senior high school students in South Sulawesi Province who sat the Indonesian National Examination for 2015/2016 academic year. The samples of this research are 800 students’ scores from 8 schools taken by employing the multistage random sampling technique. The data of this research is a secondary data since it is obtained from the education office for South Sulawesi. In analyzing the collected data, the researcher employed the independent samples T-Test with the help of SPSS v.24 program. The finding of this research reveals that there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based Tests (p < .05). Moreover, students tested by using PBT (Mean = 63.13, SD = 13.63) achieve higher score than those tested by using CBT (Mean = 46.33, SD = 14.68).Keywords: computer-based test, paper-based test, Indonesian national examination, testing
Procedia PDF Downloads 1679317 Receptiveness of Market Segmentation Towards Online Shopping Attitude: A Quality Management Strategy for Online Passenger Car Market
Authors: Noor Hasmini Abdghani, Nik Kamariah Nikmat, Nor Hayati Ahmad
Abstract:
Rapid growth of the internet technology led to changes in the consumer lifestyles. This involved customer buying behaviour-based internet that create new kind of buying strategy. Hence, it has summoned many of world firms including Malaysia to generate new quality strategy in preparation to face new customer buying lifestyles. Particularly, this study focused on identifying online customer segment of automobile passenger car customers. Secondly, the objective is to understand online customer’s receptiveness towards internet technologies. This study distributed 700 questionnaires whereby 582 were returned representing 83% response rate. The data were analysed using factor and regression analyses. The result from the factor analysis precipitates four online passenger car segmentations in Malaysia, which are: Segment (1)- Automobile Online shopping Preferences, Segment (2)- Automobile Online Brand Comparison, Segment (3)- Automobile Online Information Seeking and Segment (4)- Automobile Offline Shopping Preferences. In understanding the online customer’s receptiveness towards internet, the regression result shows that there is significant relationship between each of four segments of online passenger car customer with attitude towards automobile online shopping. This implies that, for online customers to have receptiveness toward internet technologies, he or she must have preferences toward online shopping or at least prefer to browse any related information online even if the actual purchase is made at the traditional store. With this proposed segmentation strategy, the firms especially the automobile firms will be able to understand their online customer behavior. At least, the proposed segmentation strategy will help the firms to strategize quality management approach for their online customers’ buying decision making.Keywords: Automobile, Market Segmentation, Online Shopping Attitude, Quality Management Strategy
Procedia PDF Downloads 5409316 Adsorptive Waste Heat Based Air-Conditioning Control Strategy for Automotives
Authors: Indrasen Raghupatruni, Michael Glora, Ralf Diekmann, Thomas Demmer
Abstract:
As the trend in automotive technology is fast moving towards hybridization and electrification to curb emissions as well as to improve the fuel efficiency, air-conditioning systems in passenger cars have not caught up with this trend and still remain as the major energy consumers amongst others. Adsorption based air-conditioning systems, e.g. with silica-gel water pair, which are already in use for residential and commercial applications, are now being considered as a technology leap once proven feasible for the passenger cars. In this paper we discuss a methodology, challenges and feasibility of implementing an adsorption based air-conditioning system in a passenger car utilizing the exhaust waste heat. We also propose an optimized control strategy with interfaces to the engine control unit of the vehicle for operating this system with reasonable efficiency supported by our simulation and validation results in a prototype vehicle, additionally comparing to existing implementations, simulation based as well as experimental. Finally we discuss the influence of start-stop and hybrid systems on the operation strategy of the adsorption air-conditioning system.Keywords: adsorption air-conditioning, feasibility study, optimized control strategy, prototype vehicle
Procedia PDF Downloads 4359315 Evaluating the Possibility of Expanding National Health Insurance Funding From Zakat, Sudan
Authors: Fawzia Mohammed Idris
Abstract:
Zakat is an Islamic procedure for wealth distribution as a social protection mechanism for needy people. This study aimed to assess the possibility to expand the share of fund for national health insurance fund from zakat funds allocated for poor people by measuring the reduction of poverty that result from the investing on direct payment to the needy or by covering them in social health insurance. This study used stata regression as a statistical analysis tool and the finding clarified that there is no significant relationship between the poverty rate as the main indicator and, the number of poor people covered by national health insurance on one hand and the number of benefits poor people from the distribution of zakat fund. This study experienced many difficulties regarding the quality and the consistency of the data. The study suggested that a joint mission between national health insurance fund and zakat chamber to conduct study to assess the efficient use of zakat fund allocated to poor people.Keywords: health finance, poverty, social health insurance, zakat
Procedia PDF Downloads 1469314 The Use of AI to Measure Gross National Happiness
Authors: Riona Dighe
Abstract:
This research attempts to identify an alternative approach to the measurement of Gross National Happiness (GNH). It uses artificial intelligence (AI), incorporating natural language processing (NLP) and sentiment analysis to measure GNH. We use ‘off the shelf’ NLP models responsible for the sentiment analysis of a sentence as a building block for this research. We constructed an algorithm using NLP models to derive a sentiment analysis score against sentences. This was then tested against a sample of 20 respondents to derive a sentiment analysis score. The scores generated resembled human responses. By utilising the MLP classifier, decision tree, linear model, and K-nearest neighbors, we were able to obtain a test accuracy of 89.97%, 54.63%, 52.13%, and 47.9%, respectively. This gave us the confidence to use the NLP models against sentences in websites to measure the GNH of a country.Keywords: artificial intelligence, NLP, sentiment analysis, gross national happiness
Procedia PDF Downloads 1199313 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 6609312 Improving Access to Palliative Care for Heart Failure Patients in England Using a Health Systems Approach
Authors: Alex Hughes
Abstract:
Patients with advanced heart failure develop specific palliative care needs due to the progressive symptom burden and unpredictable disease trajectory. NICE guidance advises that palliative care should be provided to patients with both cancer and non-cancer conditions as and when required. However, there is some way to go before this guidance is consistently and effectively implemented nationwide in conditions such as heart failure. The Ambitions for Palliative and End of Life Care: A national framework for local action in England provides a set of foundations and ambitions which outline a vision for what high-quality palliative and end-of-life care look like in England. This poster aims to critically consider how to improve access to palliative care for heart failure patients in England by analysing the foundations taken from this framework to generate specific recommendations using Soft Systems Methodology (SSM). The eight foundations analysed are: ‘Personalised care planning’, ‘Shared records’, ‘Evidence and information’, ‘Involving, supporting and caring for those important to the dying Person’, ‘Education and training’, ‘24/7 access’, ‘Co-design’ and ‘Leadership.’ A number of specific recommendations have been generated which highlight a need to close the evidence-policy gap and implement policy with sufficient evidence. These recommendations, alongside the creation of an evidence-based national strategy for palliative care and heart failure, should improve access to palliative care for heart failure patients in England. Once implemented, it will be necessary to evaluate the effect of these proposals to understand if access to palliative care for heart failure patients actually improves.Keywords: access, health systems, heart failure, palliative care
Procedia PDF Downloads 128