Search results for: security and safeguards measures
5329 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs
Procedia PDF Downloads 955328 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia
Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro
Abstract:
Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.Keywords: border security, defense, energy, national interest, threat
Procedia PDF Downloads 4805327 Relieving Flood Damages In Malaysia through Tax Policies And Measures: A Comparative Analysis
Authors: Chee Fei Chang, May Yee Ng
Abstract:
As a result of its geographical location, flood is a natural disaster that happens regularly in Malaysia. Every year, heavy rainfall is brought by the cyclical monsoon to the East coast of Peninsular Malaysia. In recent years, the occurrence of unexpected heavy downpour somehow connected to climate-change phenomena is also on the increasing trend. Ironically, despite that Malaysians have suffered significant monetary losses as a result of the recurring floods in past many decades, little has been done by the government from the perspective of taxation. Perhaps due to political reason or as a populist measure, the federal and local government are more inclined to offer small cash handout then rolling out long-term tax policy or measure in relieving the financial and tax burden of the victims and affected business entities. Except for the one-off tax break granted to affected businesses in 2007, the authors have not found any income tax exemption or deduction order gazetted with regard to flood disaster. Hence, it is imperative for this study to explore the need and challenges of implementing flood inflicted disaster tax relief or credit in Malaysia. This research consists of two major parts. First, the assessment of relevant tax policies/ measures with regard to non-government organisations and other affected parties. Content and thematic analyses will be applied on current tax legislations and orders issued for this part. Second, a comparative analysis will be conducted benchmarking various disaster tax reliefs and credits implemented in developed countries. Resulting from the increasing climate change-related disasters in Malaysia, the findings of this study will shed light on the importance of introducing disaster tax relief measures to assist individual victims as well as the affected businesses.Keywords: climate-changed related disaster, disaster tax credits, tax relief for victims, tax measures for disaster recovery
Procedia PDF Downloads 1215326 Swallowing Outcomes in Supraglottic Cancer Patients after Trans-Oral Robotic Surgery (TORS) Provided with Early Dysphagia Management Using Standardized Functional and Objective Measures
Authors: Hitesh Gupta, Surender Dabas
Abstract:
TORS is increasingly gaining widespread use and has been explored as minimally invasive surgery for the treatment of supraglottic cancer (SGC). Being a central critical role of Supraglottis in deglutition, swallowing outcomes post TORS remain a most important factor. Available published studies show inconsistent swallowing outcomes and are deficient in standardized outcome measures, description of swallowing recovery and rehabilitation. So, the objective of this study is to find out swallowing outcomes in SGC patients after TORS provided with early dysphagia management using standardized measures. Prospectively 16 patients were recruited in the study who underwent TORS for primary tumor of Supraglottis, involving one or more sub-sites or invading to sites other than Supraglottis at the BLK Super Specialty Hospital, New Delhi from March 2019 to June 2020. All patients were evaluated for dysphagia with subsequent swallowing rehabilitation on post operative day 3 in the hospital or at the time of discharge, whichever was earlier. Functional oral intake scale (FOIS) and penetration-aspiration score (PAS) were used as outcome measures to quantify swallowing recovery at one month and six month post operatively. Post TORS, patients achieved functional swallow in less than one month, where resection was limited to Supraglottis, while the recovery was delayed in patients with extended resection to tongue base or hypopharynx. Overall, out of Total 16 cases including all supraglottis sub-catagories, 13 (81%) could remove their NG tube (FOIS ≥5 and PAS=1 ) within 6 months. In which 8 cases(62%) achieved functional swallow in less than one month. Swallowing outcomes post TORS supraglottic laryngectomy are favorable if provided with early dysphagia management (or swallowing rehabilitation).Keywords: dysphagia, supraglottic cancer, swallowing, TORS
Procedia PDF Downloads 1055325 Development of Non-Intrusive Speech Evaluation Measure Using S-Transform and Light-Gbm
Authors: Tusar Kanti Dash, Ganapati Panda
Abstract:
The evaluation of speech quality and intelligence is critical to the overall effectiveness of the Speech Enhancement Algorithms. Several intrusive and non-intrusive measures are employed to calculate these parameters. Non-Intrusive Evaluation is most challenging as, very often, the reference clean speech data is not available. In this paper, a novel non-intrusive speech evaluation measure is proposed using audio features derived from the Stockwell transform. These features are used with the Light Gradient Boosting Machine for the effective prediction of speech quality and intelligibility. The proposed model is analyzed using noisy and reverberant speech from four databases, and the results are compared with the standard Intrusive Evaluation Measures. It is observed from the comparative analysis that the proposed model is performing better than the standard Non-Intrusive models.Keywords: non-Intrusive speech evaluation, S-transform, light GBM, speech quality, and intelligibility
Procedia PDF Downloads 2575324 The Continuing Saga of Poverty Reduction and Food Security in the Philippines
Authors: Shienna Marie Esteban
Abstract:
The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.Keywords: agriculture, food security, policy, poverty
Procedia PDF Downloads 3095323 Flood Planning Based on Risk Optimization: A Case Study in Phan-Calo River Basin in Vinh Phuc Province, Vietnam
Authors: Nguyen Quang Kim, Nguyen Thu Hien, Nguyen Thien Dung
Abstract:
Flood disasters are increasing worldwide in both frequency and magnitude. Every year in Vietnam, flood causes great damage to people, property, and environmental degradation. The flood risk management policy in Vietnam is currently updated. The planning of flood mitigation strategies is reviewed to make a decision how to reach sustainable flood risk reduction. This paper discusses the basic approach where the measures of flood protection are chosen based on minimizing the present value of expected monetary expenses, total residual risk and costs of flood control measures. This approach will be proposed and demonstrated in a case study for flood risk management in Vinh Phuc province of Vietnam. Research also proposed the framework to find a solution of optimal protection level and optimal measures of the flood. It provides an explicit economic basis for flood risk management plans and interactive effects of options for flood damage reduction. The results of the case study are demonstrated and discussed which would provide the processing of actions helped decision makers to choose flood risk reduction investment options.Keywords: drainage plan, flood planning, flood risk, residual risk, risk optimization
Procedia PDF Downloads 2415322 Sustainability Rating System for Infrastructure Projects in UAE
Authors: Amrutha Venugopal, Rabee Rustum
Abstract:
In spite of huge investments and the vital role infrastructure plays in the economy of UAE, the country has not yet developed an assessment scheme to measure the sustainability of infrastructure projects/development. The aim of this study was to develop a sustainability rating system for infrastructure projects in UAE using weighted indicator scoring. The identification of the list of 66 indicators was done by content analysis. The sources of content analysis were from government guidelines, research literature and sustainability rating system for infrastructure projects namely BCA Greenmark for Infrastructure (Singapore), ISCA (Australia) and Envision (USA). These indicators were shortlisted based on their relevance in the UAE. A mixture of qualitative and quantitative research methods is utilized to find the weightage to be applied to the indicators and to find suggestive measures to improve infrastructure sustainability in this region. Interviews and surveys were conducted with a good mix of experts from the industry. The data collected from the interviews were collated to provide suggestive measures for improving infrastructure sustainability. The collected survey data were analyzed using statistical analysis techniques to find the indicator weighing. The indicators were shortlisted by 75% to minimize the effort and investment into the process. The weighing of the deleted indicators was distributed among the critical clusters identified by Pareto analysis. Finally a simple Microsoft Excel tool was developed as the rating tool by using the calculated weighing for the indicators.Keywords: infrastructure, rating system, suggestive measures, sustainability, UAE
Procedia PDF Downloads 3025321 Audit Quality and Audit Regulation in European Union: A Perspective, Considering Actual and Perception Based Measures
Authors: Daniela Monteiro
Abstract:
Considering the entry into force of the new EU audit reform regarding statutory auditors, in effect in all member states since 2016, this research aims to identify which audit regulation rules are associated with a high-level audit quality on both its dimensions, i.e., the actual quality and the perceived quality, in relation to public interest entities, within the European Union, and whether those rules have the same impact on both dimensions. Its measurement was based on the following proxies: the quality of financial information through earnings management and the impact of qualified opinions on financial costs. We considered in the research regulation subjects such as auditors’ rotation and provision of services (NAS) and also the level of market concentration. The criteria to include these issues in the research was its contemplation of the new rules. We studied the period before the audit reform (2009-2015) when the regulation measures were less uniform. Besides the consideration of both dimensions of audit quality and several regulation measures, we believe our conclusions configure an important contribution to this research field, considering the involvement of the first 15 member states of the European Union. The results consolidate the assumption that the balance between competence and independence is not the only challenge related to the regulation of the audit profession. The evidence demonstrates that the balance between actual and perceived quality is also a relevant matter. The major conclusion is that the challenge is to keep balanced both actual and perceived audit quality whilst ensuring the independence and competence of auditors. Procedia PDF Downloads 1805320 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 1905319 Mapping the Suitable Sites for Food Grain Crops Using Geographical Information System (GIS) and Analytical Hierarchy Process (AHP)
Authors: Md. Monjurul Islam, Tofael Ahamed, Ryozo Noguchi
Abstract:
Progress continues in the fight against hunger, yet an unacceptably large number of people still lack food they need for an active and healthy life. Bangladesh is one of the rising countries in the South-Asia but still lots of people are food insecure. In the last few years, Bangladesh has significant achievements in food grain production but still food security at national to individual levels remain a matter of major concern. Ensuring food security for all is one of the major challenges that Bangladesh faces today, especially production of rice in the flood and poverty prone areas. Northern part is more vulnerable than any other part of Bangladesh. To ensure food security, one of the best way is to increase domestic production. To increase production, it is necessary to secure lands for achieving optimum utilization of resources. One of the measures is to identify the vulnerable and potential areas using Land Suitability Assessment (LSA) to increase rice production in the poverty prone areas. Therefore, the aim of the study was to identify the suitable sites for food grain crop rice production in the poverty prone areas located at the northern part of Bangladesh. Lack of knowledge on the best combination of factors that suit production of rice has contributed to the low production. To fulfill the research objective, a multi-criteria analysis was done and produced a suitable map for crop production with the help of Geographical Information System (GIS) and Analytical Hierarchy Process (AHP). Primary and secondary data were collected from ground truth information and relevant offices. The suitability levels for each factor were ranked based on the structure of FAO land suitability classification as: Currently Not Suitable (N2), Presently Not Suitable (N1), Marginally Suitable (S3), Moderately Suitable (S2) and Highly Suitable (S1). The suitable sites were identified using spatial analysis and compared with the recent raster image from Google Earth Pro® to validate the reliability of suitability analysis. For producing a suitability map for rice farming using GIS and multi-criteria analysis tool, AHP was used to rank the relevant factors, and the resultant weights were used to create the suitability map using weighted sum overlay tool in ArcGIS 10.3®. Then, the suitability map for rice production in the study area was formed. The weighted overly was performed and found that 22.74 % (1337.02 km2) of the study area was highly suitable, while 28.54% (1678.04 km2) was moderately suitable, 14.86% (873.71 km2) was marginally suitable, and 1.19% (69.97 km2) was currently not suitable for rice farming. On the other hand, 32.67% (1920.87 km2) was permanently not suitable which occupied with settlements, rivers, water bodies and forests. This research provided information at local level that could be used by farmers to select suitable fields for rice production, and then it can be applied to other crops. It will also be helpful for the field workers and policy planner who serves in the agricultural sector.Keywords: AHP, GIS, spatial analysis, land suitability
Procedia PDF Downloads 2405318 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks
Authors: Sungchul Ha, Hyunwoo Kim
Abstract:
In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.Keywords: MANETs, IDS, power control, minimum spanning tree
Procedia PDF Downloads 3705317 Impact of Sovereign Debt Risk and Corrective Austerity Measures on Private Sector Borrowing Cost in Euro Zone
Authors: Syed Noaman Shah
Abstract:
The current paper evaluates the effect of external public debt risk on the borrowing cost of private non-financial firms in euro zone. Further, the study also treats the impact of austerity measures on syndicated-loan spreads of private firm followed by euro area member states to revive the economic growth in the region. To test these hypotheses, we follow multivariate ordinary least square estimation method to assess the effect of external public debt on the borrowing cost of private firms. By using foreign syndicated-loan issuance data of non-financial private firms from 2005 to 2011, we attempt to gauge how the private financing cost varies with high levels of sovereign external debt prevalent in the euro zone. Our results suggest significant effect of external public debt on the borrowing cost of private firm. In particular, an increase in external public debt by one standard deviation from its sample mean raises syndicated-loan spread by 89 bps. Furthermore, weak creditor rights protection prevalent in member states deepens this effect. However, we do not find any significant effect of domestic public debt on the private sector borrowing cost. In addition, the results show significant effect of austerity measures on private financing cost, both in normal and in crisis period in the euro zone. In particular, one standard deviation change in fiscal consolidation conditional mean reduces the syndicated-loan spread by 22 bps. In turn, it indicates strong presence of credibility channel due to austerity measures in euro area region.Keywords: corporate debt, fiscal consolidation, sovereign debt, syndicated-loan spread
Procedia PDF Downloads 4115316 Empirical Investigation into Climate Change and Climate-Smart Agriculture for Food Security in Nigeria
Authors: J. Julius Adebayo
Abstract:
The objective of this paper is to assess the agro-climatic condition of Ibadan in the rain forest ecological zone of Nigeria, using rainfall pattern and temperature between 1978-2018. Data on rainfall and temperature in Ibadan, Oyo State for a period of 40 years were obtained from Meteorological Section of Forestry Research Institute of Nigeria, Ibadan and Oyo State Meteorology Centre. Time series analysis was employed to analyze the data. The trend revealed that rainfall is decreasing slowly and temperature is averagely increasing year after year. The model for rainfall and temperature are Yₜ = 1454.11-8*t and Yₜ = 31.5995 + 2.54 E-02*t respectively, where t is the time. On this basis, a forecast of 20 years (2019-2038) was generated, and the results showed a further downward trend on rainfall and upward trend in temperature, this indicates persistence rainfall shortage and very hot weather for agricultural practices in the southwest rain forest ecological zone. Suggestions on possible solutions to avert climate change crisis and also promote climate-smart agriculture for sustainable food and nutrition security were also discussed.Keywords: climate change, rainfall pattern, temperature, time series analysis, food and nutrition security
Procedia PDF Downloads 1425315 Impact of Organic Farming on Soil Fertility and Microbial Activity
Authors: Menuka Maharjan
Abstract:
In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.Keywords: organic farming, soil fertility, micobial biomas, food security
Procedia PDF Downloads 1745314 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems
Authors: Wu You, Burra Venkata Durga Kumar
Abstract:
This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security
Procedia PDF Downloads 895313 Sustainable Balanced Scorecard for Kaizen Evaluation: Comparative Study between Egypt and Japan
Authors: Ola I. S. El Dardery, Ismail Gomaa, Adel R.M. Rayan, Ghada El Khayat, Sara H. Sabry
Abstract:
Continuous improvement activities are becoming a key factor of the success of any organization, those improvement activities include but not limited to kaizen, six sigma, lean projects, and continuous improvement projects. Kaizen is a Japanese philosophy of continuous improvement by making small incremental changes to improve an organization’s performance, reduce costs, reduce delay time, reduce waste in production, etc. This study aims at proposing a new measuring technique for kaizen activities using a Sustainable balanced scorecard structure. A survey questionnaire was developed and introduced to kaizen participants in both Egypt and Japan with the purpose of allocating key performance indicators for both kaizen process (critical success factors) and result (kaizen benefits) into the five perspectives of sustainable balanced scorecard. The study contributes to the literature by presenting a new kaizen measurement of both kaizen process and results, that will illuminate the benefits of using kaizen. Also, the presented measurement can help in the sustainability of kaizen implementation. Determining the combination of the proper kaizen measures could be used by any industry whether service or manufacturing to better measure kaizen activates. The comparison between Japanese measures, as the leaders of kaizen philosophy, and Egyptian measures will help recommending better practices of kaizen in Egypt, and contributing to the 2030 sustainable development goals.Keywords: continuous improvements, kaizen, performance, sustainable balanced scorecard
Procedia PDF Downloads 1475312 Solving 94-Bit ECDLP with 70 Computers in Parallel
Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai
Abstract:
Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.Keywords: Pollard's rho method, BN curve, Montgomery multiplication
Procedia PDF Downloads 2705311 Spatial Spillovers in Forecasting Market Diffusion of Electric Mobility
Authors: Reinhold Kosfeld, Andreas Gohs
Abstract:
In the reduction of CO₂ emissions, the transition to environmentally friendly transport modes has a high significance. In Germany, the climate protection programme 2030 includes various measures for promoting electromobility. Although electric cars at present hold a market share of just over one percent, its stock more than doubled in the past two years. Special measures like tax incentives and a buyer’s premium have been put in place to promote the shift towards electric cars and boost their diffusion. Knowledge of the future expansion of electric cars is required for planning purposes and adaptation measures. With a view of these objectives, we particularly investigate the effect of spatial spillovers on forecasting performance. For this purpose, time series econometrics and panel econometric models are designed for pure electric cars and hybrid cars for Germany. Regional forecasting models with spatial interactions are consistently estimated by using spatial econometric techniques. Regional data on the stocks of electric cars and their determinants at the district level (NUTS 3 regions) are available from the Federal Motor Transport Authority (Kraftfahrt-Bundesamt) for the period 2017 - 2019. A comparative examination of aggregated regional and national predictions provides quantitative information on accuracy gains by allowing for spatial spillovers in forecasting electric mobility.Keywords: electric mobility, forecasting market diffusion, regional panel data model, spatial interaction
Procedia PDF Downloads 1745310 Development of a Program for the Evaluation of Thermal Performance Applying the Centre Scientifique et Techniques du Bâtiment Method Case Study: Classroom
Authors: Iara Rezende, Djalma Silva, Alcino Costa Neto
Abstract:
Considering the transformations of the contemporary world linked to globalization and climate changes caused by global warming, the environmental and energy issues have been increasingly present in the decisions of the world scenario. Thus, the aim of reducing the impacts caused by human activities there are the energy efficiency measures, which are also applicable in the scope of Civil Engineering. Considering that a large part of the energy demand from buildings is related to the need to adapt the internal environment to the users comfort and productivity, measures capable of reducing this need can minimize the climate changes impacts and also the energy consumption of the building. However, these important measures are currently little used by civil engineers, either because of the interdisciplinarity of the subject, the time required to apply certain methods or the difficult interpretation of the results obtained by computational programs that often have a complex and little applied approach. Thus, it was proposed the development of a Java application with a simpler and applied approach to evaluate the thermal performance of a building in order to obtain results capable of assisting the civil engineers in the decision making related to the users thermal comfort. The program was built in Java programming language and the method used for the evaluation was the Center Scientifique et Technique du Batiment (CSTB) method. The program was used to evaluate the thermal performance of a university classroom. The analysis was carried out from simulations considering the worst climatic situation of the building occupation. Thus, at the end of the process, the favorable result was obtained regarding the classroom comfort zone and the feasibility of using the program, thus achieving the proposed objectives.Keywords: building occupation, CSTB method, energy efficiency measures, Java application, thermal comfort
Procedia PDF Downloads 1305309 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 1435308 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 135307 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1245306 Influence of European Funds on the Sector of Bovine Milk and Meat in Romania in the Period 2007-2013
Authors: Andrei-Marius Sandu
Abstract:
This study aims to analyze the bovine meat and milk sector for the period 2007-2013. For the period analyzed, it is known that Romania has benefited from EU funding through the National Rural Development Programme 2007-2013. In this programme, there were measures that addressed exclusively the animal husbandry sector in Romania. This paper presents data on bovine production of meat, milk and livestock in Romania, but also data on the price and impact the European Funds implementation had on them.Keywords: European funds, measures, national rural development programme, price
Procedia PDF Downloads 4215305 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 3495304 Migratory Trajectory of Transnational Street Beggars in South Western, Nigeria
Authors: Usman Adekunle Ojedokun, Adeyinka Abideen Aderinto
Abstract:
Migration remains an important course of action often resort-to by human and some other classes of animal for survival in the face of life-threatening conditions. However, the activity of certain group of immigrants, who are exploiting the socio-economic and environmental challenges in their home countries to conduct street begging across different countries in Africa, is fast becoming a major cause for concern. This paper examined the migratory trajectory of transnational street beggars in South Western, Nigeria. Strain and Migration Network Theories were adopted for the study. The methods of data collection were survey questionnaire, in-depth interview, and key informant interview. Convenience and purposive sampling techniques were employed for the selection of 395 transnational street beggars and 4 key informants were purposively chosen. Findings revealed that transnational street beggars immigrated into Nigeria all year round and all of them came by road. Also, while some of them entered the country officially, others gained entry illegally. The majority (29.3%) arrived through Sokoto, a border State to some neighbouring countries. This study calls for more security measures at the Nigerian borders as a way of controlling the influx of this category of beggars into the country.Keywords: transnational street beggars, street begging, migration, Nigeria
Procedia PDF Downloads 2595303 Low Density Lipoprotein: The Culprit in the Development of Obesity
Authors: Ojiegbe Ikenna Nathan
Abstract:
Obesity is a medical condition in which excess body fat has accumulated to the extent that it leads to reduced life expectancy and or increased health problems. Obesity as a worldwide problem is seen clustered in the families and it moves from generation to generation. It causes some disabilities, mortality and morbidity if left unattended to. The predisposing factors to obesity are either genetic or environment in origin. Nevertheless, the main predisposing factor to obesity is the excessive consumption of food rich in low-density lipoprotein (LDL) such as organ meats, saturated fats etc. This low-density lipoprotein causes an increase in adipose tissue and complicates to obesity. There are varieties of obesity which one needs to take appropriate measures to avoid; such as android, gynoid and morbid obesity. Nonetheless, studies have shown that there is hope for the obese individuals, despite the cause, type and degree of their obesity. This is through the use of the different available treatment measures which increase in physical activities, caloric restrictions, drug therapy and surgical intervention.Keywords: low-density, lipoprotein, culprit, obesity
Procedia PDF Downloads 3985302 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4035301 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 1185300 Management and Conservation of Crop Biodiversity in Karnali Mountains of Nepal
Authors: Chhabi Paudel
Abstract:
The food and nutrition security of the people of the mountain of Karnali province of Nepal is dependent on traditional crop biodiversity. The altitude range of the study area is 1800 meters to 2700 meters above sea level. The climate is temperate to alpine. Farmers are adopting subsistent oriented diversified farming systems and selected crop species, cultivars, and local production systems by their own long adaptation mechanism. The major crop species are finger millet, proso millet, foxtail millet, potato, barley, wheat, mountain rice, buckwheat, Amaranths, medicinal plants, and many vegetable species. The genetic and varietal diversity of those underutilized indigenous crops is also very high, which has sustained farming even in uneven climatic events. Biodiversity provides production synergy, inputs, and other agro-ecological services for self-sustainability. But increase in human population and urban accessibility are seen as threats to biodiversity conservation. So integrated conservation measures are suggested, including agro-tourism and other monetary benefits to the farmers who conserve the local biodiversity.Keywords: crop biodiversity, climate change, in-situ conservation, resilience, sustainability, agrotourism
Procedia PDF Downloads 96