Search results for: security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7760

Search results for: security challenges

6890 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 127
6889 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security

Authors: Chandanee Wasana Kalansooriya

Abstract:

Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.

Keywords: diabetes, food security, glycemic index, rice consumption

Procedia PDF Downloads 85
6888 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 222
6887 Challenges Faced by the Visually Impaired Children and their Parents in Doing Homework Assignments Using Braille

Authors: Shazia Farooq Mirza

Abstract:

The purpose of this study was to explore the challenges faced by visually impaired children and their parents in doing homework assignments using Braille. This study had a quantitative approach and it was descriptive in nature. It took place in 6 public and special private schools of Lahore.177 visually impaired children of grades 4-10 and 153 parents of the visually impaired children were the volunteer participants of this study which were selected through a convenient sampling method. A survey method was adopted for the data collection. And for this purpose 2 self-developed validated questionnaires were used as instruments. The instruments were constructed by exploring the factors and sub-factors from the literature review. Thirty students with visual impairment and 30 parents of the students with visual impairment filled the questionnaires as a pilot study, and it ensured the reliability of the instruments. Data were analyzed using a statistical package of social sciences and it was completely interpreted. Findings revealed that the common challenges faced by the students with visual impairment were Physical Stress, Readiness, Braille Knowledge, Braille Skill and Communications. And the major challenges faced by the parents of the students with visual impairment were the Availability of the helping material, the Availability of the reading material, Braille Knowledge, Braille skills, School and family interactions, Behavior management and the Environment and equipment. Conclusions were drawn on the basis of the major findings. Future suggestions are given in light of the conclusions. This study will be beneficial for the children with visual impairment, the parents of the children with visual impairment, the special education teachers and for the policymakers of the special schools.

Keywords: challenges, visually impaired children, homework, parents, braille

Procedia PDF Downloads 102
6886 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 191
6885 Challenges of Integrating Islamic Education with Contemporary Secular System in Igaland, Kogi State Of Nigeria

Authors: Yunusa Odiba

Abstract:

Islam, from its root is a divine religion and it does not exercise anything except within the scope of its divinity-its culture, tradition morality, and the like. The damage done to the legacies, traditions, culture, morality, viability, continued existence and relevance of the Islamic religious way of life by the prevalent western secular education system in the Muslim world has become a thing of interest to many scholars especially, the Muslim scholars, hence, advocating the integration of Islamic education with the western circular educational system. The aim is to produce a new generation of dedicated Muslims whose education has prepared them for the challenges of contemporary materialistic circulation alongside real Islamic knowledge. This paper, however, examines the process of integrating Islamic schools with the contemporary western based schools that would under-take the unification which should function as basic organ of Muslim ideological revivalism, cultural retention, identity formation, socio-economic development, and scientific and ecological inventiveness.

Keywords: challenges, integrating, Islamic education, secular system, Igalaland

Procedia PDF Downloads 678
6884 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 504
6883 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 157
6882 Rural Electrification in India-Challenges and Solutions

Authors: P. Chandhra Sekhar, R. A. Deshpande, T. Raghunatha

Abstract:

The government of India has given special attention on rural electrification under Rajiv Gandhi Grameena Vidyuthikarana Yojana (RGGVY) during 10th plan and 11th plan. Government of India electrified about 107523 villages and 21164003 BPL Households. This paper briefs about various rural electrification programs initiated by government of India and status of RGGVY in India. The paper mainly describes about challenges in the rural electrification, new ideas recently implemented and suggestions for improvement in the rural electrification.

Keywords: rural electrification, RGGVY, NJY, BPL

Procedia PDF Downloads 396
6881 Leadership Development in Nepal: Challenges and Prospects

Authors: Deepak Chaudhary

Abstract:

This paper attempts to analyze the leadership phenomena, its challenges, and prospects in Nepal. Literature is reviewed rigorously to explain the theoretical and empirical aspects of leadership. Besides, In-depth interviews with three national leaders were interviewed to know the challenges regarding polity and leadership. Similarly, a survey among 434 households in Katahari rural municipality and Godavari municipality was carried out to assess people’s perceptions of leaders. Leadership is normally pronounced in the wake of the success of the country’s development or crisis management. Real leaders are those who can avert any crisis successfully and proceed with the country in a progressive and normal way. Leadership’s working style can create a favorable institutional environment in the public institution that can lead development programs successfully. However, the literature suggests that Nepal is still struggling towards modernization in comparison to some East-Asian countries whose socio-economic situation was more similar in the 1950s. Similarly, Nepal has been facing several social movements after the 1990s, which resulted in a new political system, though the performance of the public institution has been a question and it goes to the leadership’s role. The poor tackling of natural disasters like earthquakes flooding, and pandemics raises the questions of the leadership’s role to some extent. The government of Nepal's record of developmental expenditures is dismal. However, leadership has been the central part of people, community, and country, and hence, the study of leadership phenomena in relation to a country’s well-being is intrinsic.

Keywords: challenges, leadership, institutionalization, effectiveness

Procedia PDF Downloads 49
6880 Emerging Challenges with Collective Bargaining Agreements In Kenya: The Introduction of Salary and Remuneration Commission Through The Constitution of Kenya 2010

Authors: Benard Omogo

Abstract:

The Kenyan Constitution 2010 introduced various commissions to devolve the powers that were previously centralized through the imperial Presidency. One of the commissions that directly determine the levels of remuneration and terms of service of Kenyan workers is the Salary and Remuneration Commission (SRC). Article 230 of the Kenyan Constitution 2010 mandates this commission to regularly review the remuneration and benefits of all the state officers and to advise the national and county governments on the remuneration and benefits of all other public officers. At the same time, article 54 of the Kenyan Labor Relations Act 2007 provides for the recognition of trade unions and collective bargaining agreements. The emerging challenges, therefore, originate from the conflicts of the mandate of the Salary and Remuneration Commission, whose advice is almost adopted as the order and this undermines the outcome of the Collective Bargaining Agreements. This has seen so many trade unions in Kenya being rendered irrelevant. This research paper is therefore going to sample the various trade unions of Kenya to assess the challenges that result from the position of the Salary and Remuneration Commission. We will also extend it by purposively sampling several trade unions in Africa to determine how they handle such challenges. The results from this paper will be useful to the Kenyan Lawmakers and Africa at large and may inform them to consider reviewing the laws and acts that relate to the trade unions for prosperity.

Keywords: salary, remuneration, collective, bargaining, labor laws

Procedia PDF Downloads 156
6879 A Qualitative Examination of the Impact of COVID-19 on the Wellbeing of Undergraduate Students in Ontario

Authors: Soumya Mishra, Elena Neiterman

Abstract:

Aligned with the growing interest in the impact of the pandemic on academic experiences of university students, this study aimed to examine the challenges Canadian undergraduate students experienced during the university closures due to COVID-19. Using qualitative methodological approach, the study utilized semi-structured interviews conducted with 20 undergraduate students enrolled in an Ontario university to explore their thoughts and experience regarding online learning during the peak of the COVID-19 pandemic, from January 2021 to March 2021. The interviews yielded four major themes with the following associated subthemes: Personal Challenges Associated with Adapting to the Pandemic (Change in the Type of Stress Experienced, Unique Impact on Certain Groups of Students, Decreased Motivation, Crucial Role of Resilience), Social Challenges Associated with Adapting to the Pandemic (Increased Loneliness, Challenges Faced while Communicating, Perception of Group work, Role of Living Conditions), Challenges associated with Accessing University Resources (Crucial Role of Professors, Perception of Virtual Events, Importance of Physical Spaces). Overall, the analysis showed that the COVID-19 pandemic fostered resilience and psychological flexibility amongst all students. However, the mental health and social wellbeing of students deteriorated during the COVID-19 pandemic and they reported experiencing chronic stress, anxiety and loneliness. International students, first year and final year students experienced a unique set of challenges. It was hard for participants in our study to make strong new connections with their classmates and maintain existing friendships with their peers. The importance of professors in facilitating learning was amplified in the online environment due to the lack of in-person interaction with other students. Despite these challenges, most participants reported that they received high grades during online learning. The findings from this study could be helpful for organizations and individuals working towards fostering the wellbeing of undergraduate students. They can also help in making post-secondary institutions more resilient to future emergencies by creating contingency plans regarding online instructions and risk management techniques.

Keywords: Canadian, COVID-19, university students, wellbeing

Procedia PDF Downloads 85
6878 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 178
6877 Challenges Faced by the Teachers Regarding Student Assessment at Distant and Online Learning Mode

Authors: Ameema Mahroof, Muhammad Saeed

Abstract:

Purpose: The paper aimed to explore the problems faced by the faculty in a distant and online learning environment. It proposes the remedies of the problems faced by the teachers. In distant and online learning mode, the methods of student assessment are different than traditional learning mode. In this paper, the assessment strategies of these learning modes are identified, and the challenges faced by the teachers regarding these assessment methods are explored. Design/Methodology/Approach: The study is qualitative and opted for an exploratory study, including eight interviews with faculty of distant and online universities. The data for this small scale study was gathered using semi-structured interviews. Findings: Findings of the study revealed that assignment and tests are the most effective way of assessment in these modes. It further showed that less student-teacher interaction, plagiarized assignments, passive students, less time for marking are the main challenges faced by the teachers in these modes. Research Limitations: Because of the chosen research approach, the study might not be able to provide generalizable results. That’s why it is recommended to do further studies on this topic. Practical Implications: The paper includes implications for the better assessment system in online and distant learning mode. Originality/Value: This paper fulfills an identified need to study the challenges and problems faced by the teachers regarding student assessment.

Keywords: online learning, distant learning, student assessment, assignments

Procedia PDF Downloads 145
6876 Investigating Software Engineering Challenges in Game Development

Authors: Fawad Zaidi

Abstract:

This paper discusses a variety of challenges and solutions involved with creating computer games and the issues faced by the software engineers working in this field. This review further investigates the articles coverage of project scope and the problem of feature creep that appears to be inherent with game development. The paper tries to answer the following question: Is this a problem caused by a shortage, or bad software engineering practices, or is this outside the control of the software engineering component of the game production process?

Keywords: software engineering, computer games, software applications, development

Procedia PDF Downloads 462
6875 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 126
6874 Challenges of Teaching Physical Education to Students With Special Needs in Regular School Settings

Authors: Christine Okello

Abstract:

Physical Education (PE) curriculum provides school age students to explore issues that are likely to impact on health, safety, and well-being. The current curriculum includes the physical activity component, intended to improve physical fitness, social skills as well as building confidence. While this viewpoint is vital, there are challenges and stigma attached when specific issues are either ignored, inadequately addressed, or not seen to be important. The department stipulates that students attend a school that is closest to their home, to access available government transportation to and from school. Equivalently, parents of students with a disability decide where their children attend school. A choice between a regular classroom, mainstream Special Unit classroom, or a School for Specific Purposes (SSP). Parents who take their children to regular schools may be oblivious of the details of the curriculum. Physical Education outcomes does not stipulate the extent to which a student must perform or expected to perform. It is therefore due to the classroom teacher to adjust their teaching goals or outcomes to suit all students in their classroom. A student who can run a hundred meters race in 20 seconds may belong in the same classroom as a student in a wheelchair. While these students are challenged because of a lack of performance, teachers are challenged to effectively teach successful PE lessons, and on the other hand students without a disability may not be able to attain their optimum. This paper will identify areas of need, address the challenges, and explore a possible solution.

Keywords: special needs, disability, challenges, physical education

Procedia PDF Downloads 50
6873 The Challenges of Cloud Computing Adoption in Nigeria

Authors: Chapman Eze Nnadozie

Abstract:

Cloud computing, a technology that is made possible through virtualization within networks represents a shift from the traditional ownership of infrastructure and other resources by distinct organization to a more scalable pattern in which computer resources are rented online to organizations on either as a pay-as-you-use basis or by subscription. In other words, cloud computing entails the renting of computing resources (such as storage space, memory, servers, applications, networks, etc.) by a third party to its clients on a pay-as-go basis. It is a new innovative technology that is globally embraced because of its renowned benefits, profound of which is its cost effectiveness on the part of organizations engaged with its services. In Nigeria, the services are provided either directly to companies mostly by the key IT players such as Microsoft, IBM, and Google; or in partnership with some other players such as Infoware, Descasio, and Sunnet. This action enables organizations to rent IT resources on a pay-as-you-go basis thereby salvaging them from wastages accruable on acquisition and maintenance of IT resources such as ownership of a separate data centre. This paper intends to appraise the challenges of cloud computing adoption in Nigeria, bearing in mind the country’s peculiarities’ in terms of infrastructural development. The methodologies used in this paper include the use of research questionnaires, formulated hypothesis, and the testing of the formulated hypothesis. The major findings of this paper include the fact that there are some addressable challenges to the adoption of cloud computing in Nigeria. Furthermore, the country will gain significantly if the challenges especially in the area of infrastructural development are well addressed. This is because the research established the fact that there are significant gains derivable by the adoption of cloud computing by organizations in Nigeria. However, these challenges can be overturned by concerted efforts in the part of government and other stakeholders.

Keywords: cloud computing, data centre, infrastructure, it resources, virtualization

Procedia PDF Downloads 334
6872 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria

Authors: Temple Probyne Abali

Abstract:

Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).

Keywords: climate change, food security, fadama, world bank, agriculture, sdgs

Procedia PDF Downloads 79
6871 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model

Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud

Abstract:

Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.

Keywords: HMM, K-Means, Sobel, accuracy, face recognition

Procedia PDF Downloads 312
6870 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union

Authors: María Elena Menéndez Ibáñez

Abstract:

After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.

Keywords: border control, immigration, international cooperation, national security

Procedia PDF Downloads 121
6869 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites

Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar

Abstract:

Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.

Keywords: online information services, prediction, security and protection, web based services

Procedia PDF Downloads 339
6868 Community Crèche Is a Measure to Prevent Child Injuries: Its Challenges and Measures for Improvement

Authors: Rabbya Ashrafi, Mohammad Tarikul Islam , Al-Amin Bhuiyan, Aminur Rahman

Abstract:

Injury is the leading killer of children in Bangladesh. Anchal (community crèche) is an effective intervention to prevent injuries among children under 5. Through the SoLiD project, 1,600 Anchals are in place in three sub-districts in Bangladesh. The objectives of the Anchal are to provide supervision and early childhood development stimulations (ECD) to the children. A locally trained caregiver supervises 20-25 children, 9 to 59 months old, from 9 a.m. to 1 p.m., six days a week. Although it was found effective, during its implementation phase several challenges were noticed. To identify challenges and means to overcome those to improve the Anchal activities. In-depth interviews were conducted with Anchal caregivers, their supervisors, and trainers. Focus group discussions were conducted with the mothers of the Anchal children. The study was conducted in the Manohardi sub-district in November 2015. Decay of knowledge and skills after 2-3 months of training, lack of formal certification and inappropriate selection of women as Anchal caregivers, and enrollment of small children (less than 12 months) were the important challenges. The reluctance of parents to send children to the Anchal at the proper time, failure to engage children in various ECD activities, ineffective conduction of parents and community leaders meeting by the Anchal caregivers, insufficient accommodation, and poor supply of logistics for children were also the important challenges. The suggestion for improvement was to recruit caregivers as per standard criteria, provide them refreshers training at three months intervals, train them on effective conduction of parents and community leaders meetings, provide a formal certificate, and ensure regular supply of logistics. The identified challenges are needed to be addressed by utilizing the suggestions obtained from the IDIs and FGDs to make the Anchal intervention more effective in preventing childhood injuries.

Keywords: comunity crech, earlychildhood development, measures for improvement, childhood injury

Procedia PDF Downloads 75
6867 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 272
6866 Determining the Collaboration and Challenges of Public Employment Service with Stakeholders, Employers and Job Seekers: In Case of Amhara National Regional State, Ethiopia

Authors: Redie Bezabih Hailu

Abstract:

Unemployment is a problem of nations that needs a continuous research. This study aimed to determine the collaborations and challenges of public employment service (PES) with special emphasis of stakeholders, employers and job seekers. The researcher used pragmatic philosophy, exploratory design and inductive approach to collect data from the respondents using interview and focused group discussion techniques. PES provides job market information, vocational counseling, and training. As PES is not fully furnished with man power, budget, modern technologies, it is providing less adequate services to the employers and job seekers. Matching job seekers with job vacancies is the major challenge for the center and using paper-based data management system too. There is also a number of job seekers in spite of very limited number of vacancies that the service provision is poor due to the fact that there is low level of vacancies and high level of job seekers. The center has collaboration with AFE, AYA, BoTVED, BoWCY, and CETU. The major challenges with this collaborations was the absence of operational guidelines to evaluate effectiveness and performance, lottery method of selecting candidates for vacancies and nepotism or favoritism were challenges for job seekers. On the other hand, (COVID-19) pandemic, inability to get skilled labor, absence of standardized payment, expectation of job seekers and less educational quality and mass graduation were another challenges for employment services. The study recommended quality education and training, operational guideline for collaboration, technology based labor market information system and suggested further studies on quality of PES.

Keywords: public employment service, collaborations, stakeholders, employers, job seekers

Procedia PDF Downloads 24
6865 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features

Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed

Abstract:

Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.

Keywords: 3D printing, fluorescent, packaging, security

Procedia PDF Downloads 82
6864 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana

Authors: Tamekloe Michael Kossivi, Kenichi Matsui

Abstract:

Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.

Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation

Procedia PDF Downloads 102
6863 “Friction Surfaces” of Airport Emergency Plan

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes

Procedia PDF Downloads 501
6862 Transmission Line Protection Challenges under High Penetration of Renewable Energy Sources and Proposed Solutions: A Review

Authors: Melake Kuflom

Abstract:

European power networks involve the use of multiple overhead transmission lines to construct a highly duplicated system that delivers reliable and stable electrical energy to the distribution level. The transmission line protection applied in the existing GB transmission network are normally independent unit differential and time stepped distance protection schemes, referred to as main-1 & main-2 respectively, with overcurrent protection as a backup. The increasing penetration of renewable energy sources, commonly referred as “weak sources,” into the power network resulted in the decline of fault level. Traditionally, the fault level of the GB transmission network has been strong; hence the fault current contribution is more than sufficient to ensure the correct operation of the protection schemes. However, numerous conventional coal and nuclear generators have been or about to shut down due to the societal requirement for CO2 emission reduction, and this has resulted in a reduction in the fault level on some transmission lines, and therefore an adaptive transmission line protection is required. Generally, greater utilization of renewable energy sources generated from wind or direct solar energy results in a reduction of CO2 carbon emission and can increase the system security and reliability but reduces the fault level, which has an adverse effect on protection. Consequently, the effectiveness of conventional protection schemes under low fault levels needs to be reviewed, particularly for future GB transmission network operating scenarios. The proposed paper will evaluate the transmission line challenges under high penetration of renewable energy sources andprovides alternative viable protection solutions based on the problem observed. The paper will consider the assessment ofrenewable energy sources (RES) based on a fully rated converter technology. The DIgSILENT Power Factory software tool will be used to model the network.

Keywords: fault level, protection schemes, relay settings, relay coordination, renewable energy sources

Procedia PDF Downloads 181
6861 Exploring Career Guidance Program for Students with Special Needs

Authors: Rahayu Azkiya

Abstract:

Career guidance is an integral part of education that aims to help students understand their interests, talents, and potential and provide direction in choosing an appropriate career path. Approximately 76 million people are working out of 17 million people with disabilities in 2022, and this number has become a focal point as career guidance is crucial among people with special needs. Therefore, this study explores how the career guidance program is implemented and what challenges are faced by teachers. This study employs a qualitative case study in one of the senior high schools for special needs (SMLB) in Depok, Indonesia. Meanwhile, the data analysis was done through thematic analysis. Data has been obtained through the interviews of two teachers who focused on the physically impaired and deaf. The results of this study show that (1) the school has implemented career guidance well, the students were selected in the first year to look for their talents and interests, and for the second and third years, students are trained to master their abilities. (2) There are still many challenges teachers face in implementing career guidance programs, such as a need for more human resources for both students and teachers, high curriculum demands, and simple facilities that hinder student progress. Therefore, this research shows that every child is unique, so schools must meet the standards of student needs and re-evaluate the various challenges that teachers and students still face. This research is expected to serve as an analysis material for the government's policy towards special needs schools in Indonesia.

Keywords: Students with Special Needs, Career Guidance Program, Implementation, Challenges

Procedia PDF Downloads 31