Search results for: high security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21996

Search results for: high security

21096 A Compact Ultra-Wide Band Antenna with C-Shaped Slot for WLAN Notching

Authors: Maryam Rasool, Farhan Munir, Fahad Nawaz, Saad Ahmad

Abstract:

A patch antenna operating in the Ultra-Wide Band of frequency (3.1 GHz – 10.6 GHz) is designed with enhanced security from interference from other applications by incorporating the notching technique. Patch antennas in the Ultra-Wide Band are becoming widely famous due to their low power, light weight and high data rate capability. Micro strip patch antenna’s patch can be altered to increase its bandwidth and introduce UWB character in it. The designed antenna is a patch antenna consisting of a conductive sheet of metal mounted over a large sheet of metal called the ground plane with a substrate separating the two. Notched bands are public safety WLAN, WLAN and FSS. Different techniques used to implement the UWB antenna were individually implemented and there results were examined. V shaped patch was then chosen and modified to an arrow shaped patch to give the optimized results operating on the entire UWB region with considerable return loss. The frequency notch prevents the operation of the antenna at a particular range of frequency, hence minimizing interference from other systems. There are countless techniques for introducing the notch but we have used inverted C-shaped slots in the UWB patch to get the notch characteristics as output and also wavelength resonators to introduce notch in UWB band. The designed antenna is simulated in High Frequency Structural Simulator (HFSS) 13.0 by Ansoft.

Keywords: HFSS, Notch, UWB, WLAN

Procedia PDF Downloads 411
21095 An Overview of the Risk for HIV/AIDS among Young Women in South Africa: Gender Based Violence

Authors: Shaneil Taylor

Abstract:

Gender-based violence is a reflection of the inequalities that are associated within a society between the men and women that affects the health, dignity, security and autonomy of its victims. There are various determinants that contribute to the health risk of young women who have experienced sexual violence, in countries that have a high prevalence rate for HIV. For instance, in South Africa, where the highest prevalence rate for HIV is among young women, their susceptibility to the virus has been increased by sexual violence and cultural inequalities. Therefore, this study is a review of literature that explores how gender-based violence increases the possibility for HIV/AIDS among young women in South Africa.

Keywords: gender-based violence, HIV/AIDS transmission, risky sexual behavior, young women

Procedia PDF Downloads 523
21094 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo

Abstract:

Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.

Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding

Procedia PDF Downloads 200
21093 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 397
21092 Millennials' Career Expectations: Exploring Attitudes and Individual Differences in Croatia

Authors: Lovorka Galetić, Maja Klindžić, Ivana Načinović Braje

Abstract:

Generation Y individuals or Millennials are known for their unique views, work values and motivational needs which implies that, in order to attract and retain those individuals, activities in the area of career management should be given special attention by HRM managers. After a theoretical background on Millennials’ life and work attitudes, an empirical research on career preferences of Millennials in Croatia was described. Empirical research was conducted among 249 members of generation Y. The data analysis revealed that respondents generally perceive promotion opportunities as the most important career aspect; however, job security and work-life balance are almost as important. Furthermore, it was shown that Generation Y is not necessarily a homogenous group. More precisely, women assign greater importance than men to work-life balance and job security. Therefore, HRM managers should adapt career planning activities not only with respect to generational preferences, but individual characteristics as well.

Keywords: career, individual differences, millennials, work values

Procedia PDF Downloads 392
21091 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 358
21090 Improving Food Security and Commercial Development through Promotion of High Value Medicinal and Industrial Plants in the Swat Valley of Pakistan

Authors: Hassan Sher

Abstract:

Agriculture has a pivotal role in Pakistan’s economy, accounting for about one-fourth of the GDP and employing almost half the population. However, the competitiveness, productivity, growth, employment potential, export opportunity, and contribution to GDP of the sector is significantly hampered by agriculture marketing laws/regulations at the provincial level that reward rent seeking behavior, promote monopoly power, artificially reduce farmer incomes while inflating prices to consumers, and act as disincentives to investment. Although of more recent vintage than some other provincial agricultural marketing laws, the NWFP Agricultural and Livestock Produce Markets Act, 2007 is a throwback to a colonial paradigm, where restrictions on agricultural produce marketing and Government control of distribution channels is the norm. The Swat Valley (in which we include its tributary valleys) is an area of Pakistan in which there is poverty is both extreme and pervasive. For many, a significant portion of the family’s income comes from selling plants that are used as herbs, medicines, and perfumes. Earlier studies have shown that the benefit they derive from this work is less than they might because of: Lack of knowledge concerning which plants and which plant parts are valuable, Lack of knowledge concerning optimal preservation and storage of material, illiteracy. Another concern that much of the plant material sold from the valley is collected in the wild, without an appreciation of the negative impact continued collecting has on wild populations. We propose: Creating colored cards to help inhabitants recognize the 25 most valuable plants in their area; Developing and sharing protocols for growing the 25 most valuable plants in a home garden; Developing and sharing efficient mechanisms for drying plants so they do not lose value; Encouraging increased literacy by incorporating numbers and a few words in the handouts.

Keywords: food security, medicinal plants, industrial plants, economic development

Procedia PDF Downloads 323
21089 Inheritance, Stability, and Validation of Provitamin a Markers in Striga Hermonthica-Resistant Maize

Authors: Fiston Masudi Tambwe, Lwanga Charles, Arfang Badji, Unzimai Innocent

Abstract:

The development of maize varieties combining Provitamin A (PVA), high yield, and Striga resistance is an effective and affordable strategy to contribute to food security in sub-Saharan Africa, where maize is a staple food crop. There has been limited research on introgressing PVA genes into Striga-resistant maize genotypes. The objectives of this study were to: i) determine the mode of gene action controlling PVA carotenoid accumulation in Striga-resistant maize, ii) identify Striga-resistant maize hybrids with high PVA content and stable yield, and iii) validate the presence of PVA functional markers in offspring. Six elite, Striga-resistant inbred females were crossed with six high-PVA inbred males in a North Carolina Design II and their offspring were evaluated in four environments, following a 5x8 alpha lattice design with four hybrid checks. Results revealed that both additive and non-additive gene action control carotenoid accumulation in the present study, with a predominance of non-additive gene effects for PVA. Hybrids STR1004xCLHP0352 and STR1004xCLHP0046 - identified as Striga-resistant because they supported fewer Striga plants – were the highest-yielding genotypes with a moderate PVA concentration of 5.48 and 5.77 µg/g, respectively. However, those two hybrids were not stable in terms of yield across all environments. Hybrid STR1007xCLHP0046, however, supported fewer Striga plants, had a yield of 4.52 T/ha, a PVA concentration of 4.52 µg/g, and was also stable. Gel-based marker systems of CrtRB1 and LCYE were used to screen the hybrids and favorable alleles of CrtRB1 primers were detected in 20 hybrids, confirming good levels of PVA carotenoids. Hybrids with favorable alleles of LCYE had the highest concentration of non-PVA carotenoids. These findings will contribute to the development of high-yielding PVA-rich maize varieties in Uganda.

Keywords: gene action, stability, striga resistance, provitamin A markers, beta-carotene hydroxylase 1, CrtRB1, beta-carotene, beta-cryptoxanthin, lycopene epsilon cyclase, LCYE

Procedia PDF Downloads 63
21088 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 155
21087 Sustainable Food Systems in Community Development: Integrating Urban Food Security into a Growing Population

Authors: Opal Giulianelli, Pegah Zamani

Abstract:

Sustainable food has become a frequently debated topic in recent years due to a consumer push for environmentally sustainable food. While some research works on improving the monoculture farm systems that are currently in use, others focus on expanding the definition of sustainable food systems. This research looks at those concepts of alternative food systems applied to a more extensive city system. The goal is to create a theoretical site plan that could be implemented in emerging cities and other urban environments. This site plan combines the ideas of environmentally sustainable food development, such as food forests, urban farming, and community gardens. This would represent one part of a larger sustainable food system that can be altered depending on the environment or the people it is serving. However, this research is being carried out with the southeast United States in mind and, therefore, may prove difficult to apply to other regions, especially those of radically different climates.

Keywords: alternative food systems, urban design, food forests, aquaponics, hydroponics, food security, food system design

Procedia PDF Downloads 97
21086 Attachment Patterns in a Sample of South African Children at Risk in Middle Childhood

Authors: Renate Gericke, Carol Long

Abstract:

Despite the robust empirical support of attachment, advancement in the description and conceptualization of attachment has been slow and has not significantly advanced beyond the identification of attachment security or type (namely, secure, avoidant, ambivalent and disorganized). This has continued despite papers arguing for theoretical refinement in the classification of attachment presentations. For thinking and practice to advance, it is critically important that these categories and their assessment be interrogated in different contexts and across developmental age. To achieve this, a quantitative design was used with descriptive and inferential statistics, and general linear models were employed to analyze the data. The Attachment Story Completion Test (ASCT) was administered to 105 children between the ages of eight and twelve from socio-economically deprived contexts with high exposure to trauma. A staggering 93% of the children had insecure attachments (specifically, avoidant 37%, disorganized 34% and ambivalent 22%) and attachment was more complex than currently conceptualized in the attachment literature. Primary attachment did not only present as one of four discreet categories, but 70% of the sample had a complex attachment with more than one type of maternal attachment style. Attachment intensity also varied along a continuum (between 1 and 5). The findings have implications for a) research that has not considered the potential complexity of attachment or attachment intensity, b) policy to more actively support mother-infant dyads, particularly in high-risk contexts and c) question the applicability of a western conceptualization of a primary maternal attachment figure in non-western collectivist societies.

Keywords: attachment, children at risk, middle childhood, non-western context

Procedia PDF Downloads 187
21085 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm

Authors: Xinli Chen, Xue Su

Abstract:

In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.

Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking

Procedia PDF Downloads 152
21084 Sustainable Energy Supply through the Microgrid Concept: A Case Study of University of Nigeria, Nsukka

Authors: Christian Ndubisi Madu, Benjamin C. Ozumba, Ifeanyi E. Madu, Valentine E. Nnadi, Ikenna C. Ezeasor

Abstract:

The ability to generate power and achieve energy security is one of the driving forces behind the emerging ‘microgrid’ concept. Traditional power supply often operates with centralized infrastructure for generating, transmitting and distributing electricity. The inefficiency and the incessant power outages associated with the centralized power supply system in Nigeria has alienated many users who frequently turn to electric power generator sets to power their homes and offices. Such acts are unsustainable and lead to increase in the use of fossil fuels, generation of carbon dioxide emissions and other gases, and noise pollution. They also pose significant risks as they entail random purchases and storage of gasolines which are fire hazards. It is therefore important that organizations rethink their relationships to centralized power suppliers in other to improve energy accessibility and security. This study explores the energy planning processes and learning taking place at the University of Nigeria Enugu Campus as the school lead microgrid feasibility studies in its community. There is need to develop community partners to deal with the issue of energy efficiency and also to create a strategic alliance to confront political, regulatory and economic barriers to locally-based energy planning. Community-based microgrid can help to reduce the cost of adoption and diversify risks. This study offers insights into the ways in which microgrids can further democratize energy planning, procurement, and access, while simultaneously promoting efficiency and sustainability.

Keywords: microgrid, energy efficiency, sustainability, energy security

Procedia PDF Downloads 367
21083 Revised Technology Acceptance Model Framework for M-Commerce Adoption

Authors: Manish Gupta

Abstract:

Following the E-Commerce era, M-Commerce is the next big phase in the technology involvement and advancement. This paper intends to explore how Indian consumers are influenced to adopt the M-commerce. In this paper, the revised Technology Acceptance Model (TAM) has been presented on the basis of the most dominant factors that affect the adoption of M-Commerce in Indian scenario. Furthermore, an analytical questionnaire approach was carried out to collect data from Indian consumers. These collected data were further used for the validation of the presented model. Findings indicate that customization, convenience, instant connectivity, compatibility, security, download speed in M-Commerce affect the adoption behavior. Furthermore, the findings suggest that perceived usefulness and attitude towards M-Commerce are positively influenced by number of M-Commerce drivers (i.e. download speed, compatibility, convenience, security, customization, connectivity, and input mechanism).

Keywords: M-Commerce, perceived usefulness, technology acceptance model, perceived ease of use

Procedia PDF Downloads 310
21082 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique

Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis

Abstract:

Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.

Keywords: children malnutrition, food security, Local community, participatory approach

Procedia PDF Downloads 268
21081 Internet Use and Academic Procrastination Behavior in High School Students

Authors: Endah Mastuti, Prihastuti Sudaryono

Abstract:

The rapid development of Internet usage and technology influences the academic behavior of students in high schools. One of the consequences is the emergence of academic procrastination behavior. Academic procrastination behavior is students’ procrastinate behavior in completing assignments. This study aimed to see whether there are differences in the duration of using the internet with academic procrastinate behavior among high school students in Surabaya. The number of research subject is 498 high school students. Instruments of the research are academic procrastination scale and duration of the internet usage questionnaire. The results from One Way Anova shows F value 0.241 with a significance level of 0.868 This demonstrates that there is no difference between the duration of the use of the Internet with academic procrastination behavior in high school students.

Keywords: academic procrastination, duration of internet usage, students, senior high school

Procedia PDF Downloads 353
21080 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 36
21079 Composite Distributed Generation and Transmission Expansion Planning Considering Security

Authors: Amir Lotfi, Seyed Hamid Hosseini

Abstract:

During the recent past, due to the increase of electrical energy demand and governmental resources constraints in creating additional capacity in the generation, transmission, and distribution, privatization, and restructuring in electrical industry have been considered. So, in most of the countries, different parts of electrical industry like generation, transmission, and distribution have been separated in order to create competition. Considering these changes, environmental issues, energy growth, investment of private equity in energy generation units and difficulties of transmission lines expansion, distributed generation (DG) units have been used in power systems. Moreover, reduction in the need for transmission and distribution, the increase of reliability, improvement of power quality, and reduction of power loss have caused DG to be placed in power systems. On the other hand, considering low liquidity need, private investors tend to spend their money for DGs. In this project, the main goal is to offer an algorithm for planning and placing DGs in order to reduce the need for transmission and distribution network.

Keywords: planning, transmission, distributed generation, power security, power systems

Procedia PDF Downloads 473
21078 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 143
21077 Socio-Cultural Behaviors of Individuals in High-Rise Housing

Authors: Raweyah Al-Sedairawi

Abstract:

While high-rise housing detained massive negative connotations on several societies and well-being, this typology did deliver housing demand efficiently. Despite its adverse reference due to declining precedents, high-rise housing is still in global demand. Yet the suitability of this typology is still questioned. In this research, the suitability of high-rise housing as a socio-culturally sustainable solution to meet housing demands will be examined. By questioning what is the potential of high-rise housing as a socio-culturally sustainable solution for housing demands, the research will examine some high-rise housing practices. Through reviewing the literature on the origins of high-rise housing, how and why they were developed, some unsuccessful cases, and some successful cases, with the identification of factors for successful high-rise living. Thus, the research groundings will materialize from existing patterns of housing demands. Whilst most of the literature covers the housing market from an economic, real estate, and political perspective, there is less amount that discloses occupants’ reactions towards this typology and its appropriateness for the reason that income controls individuals’ choices. To bridge the gap, the prospect of implementing the study would be effective. This will be applied through a mixture of a qualitative and a quantitative methodology by conducting questionnaires and focus groups on existing cases of high-net-worth residential towers.

Keywords: architecture, behaviors, high-rise, socio-cultural, sustainability

Procedia PDF Downloads 78
21076 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education

Authors: Mohammed A. M. Ibrahim

Abstract:

This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.

Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption

Procedia PDF Downloads 331
21075 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 135
21074 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan

Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam

Abstract:

Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.

Keywords: climate change, crop insurance, heatwave, wheat yield punjab

Procedia PDF Downloads 76
21073 South Africa and U.S. AFRICOM: Reflections on a Lukewarm Relationship

Authors: Theo Neethling

Abstract:

The United States Africa Command (AFRICOM) was established in 2007 as a military and diplomatic entity and is intended to assist African states and military actors to address their security needs. At the same time, AFRICOM is clearly an extension of US strategic interests on the African continent. The challenge for the US Department of Defence is to project AFRICOM as a cooperative and willing partner. This implies a partner that offers needed services and resources, and supports African security and military priorities with no presumption of having a privileged role in defining the African future. However, one of AFRICOM’s main challenges relates to the point that it has not been able to secure a firm partnership with South Africa as a key player on the continent: South Africa has continuously taken a lukewarm, if not cold, approach towards AFRICOM since its formation. The main aim of this article is to examine and discuss South Africa’s political-military relations with AFRICOM and to assess the underlying reasons currently inhibiting AFRICOM from achieving a fully productive relationship with the South African government.

Keywords: AFRICOM, South African foreign policy, US interests, defence capabilities in Africa, US-Africa relations

Procedia PDF Downloads 296
21072 Zero Net Energy Communities and the Impacts to the Grid

Authors: Heidi von Korff

Abstract:

The electricity grid is changing in terms of flexibility. Distributed generation (DG) policy is being discussed worldwide and implemented. Developers and utilities are seeking a pathway towards Zero Net Energy (ZNE) communities and the interconnection to the distribution grid. Using the VISDOM platform for establishing a method for managing and monitoring energy consumption loads of ZNE communities as a capacity resource for the grid. Reductions in greenhouse gas emissions and energy security are primary policy drivers for incorporating high-performance energy standards and sustainability practices in residential households, such as a market transformation of ZNE and nearly ZNE (nZNE) communities. This research investigates how load data impacts ZNE, to see if there is a correlation to the daily load variations in a single ZNE home. Case studies will include a ZNE community in California and a nearly ZNE community (All – Electric) in the Netherlands, which both are in measurement and verification (M&V) phases and connected to the grid for simulations of methods.

Keywords: zero net energy, distributed generation, renewable energy, zero net energy community

Procedia PDF Downloads 302
21071 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 155
21070 Relationship between Mental Health and Food Access among Healthcare College Students in a Snowy Area in Japan

Authors: Yuki Irie, Shota Ogawa, Hitomi Kosugi, Hiromitsu Shinozaki

Abstract:

Background: Dropout from higher educational institutions is a major problem both for students and institutions, and poor mental health is one of the risk factors. Medical college students are at higher risk of poor mental health than general students because of their hard academic schedules. On the other hand, food insecurity has negative impacts on mental health. The healthcare college of the project site is located heavily snowy area. The students without own vehicles may be at higher risk of food insecurity, especially in the winter season. Therefore, they have many risks to mental health. The aim of the study is to clarify the relationship between mental health and its risk factors to promote students’ mental well-being. Method: A cross-sectional design was used to investigate the relationship between mental health status and lifestyle, including diet and food security among the students (n=421, 147 male, 274 females; 20.7 ± 2.8 years old). Participants were required to answer 3 questionnaires which consisted of diet, lifestyle, food security, and mental health. The survey was conducted during the snowy season from Dec. 2022 to Jan. 2023. Results: Mean mental score was 6.7±4.6 (max. score 27, a higher score means worse mental health). Significant risk factors in mental health were breakfast habit (p=0.02), subjective dietary habit (p=0.00), subjective health (p=0.00), exercise habit (p=0.02), food insecurity in the winter season (p=0.01), and vitamin A intakes (p=0.03). Conclusions: Nutrients intakes are not associated with mental health except vitamin A; however, some other lifestyle factors are significantly associated with mental health. Nutrition doesn’t lead to poor mental health directly; however, the promotion of a healthy lifestyle and improved food security in winter may be effective in better mental health.

Keywords: mental health, winter, lifestyle, students

Procedia PDF Downloads 84
21069 The Influence of Knowledge Spillovers on High-Impact Firm Growth: A Comparison of Indigenous and Foreign Firms

Authors: Yazid Abdullahi Abubakar, Jay Mitra

Abstract:

This paper is concerned with entrepreneurial high-impact firms, which are firms that generate ‘both’ disproportionate levels of employment and sales growth, and have high levels of innovative activity. It investigates differences in factors influencing high-impact growth between indigenous and foreign firms. The study is based on an analysis of data from United Kingdom (UK) Innovation Scoreboard on 865 firms, which were divided into high-impact firms (those achieving positive growth in both sales and employment) and low-impact firms (negative or no growth in sales or employment); in order to identifying the critical differences in regional, sectorial and size related factors that facilitate knowledge spillovers and high-impact growth between indigenous and foreign firms. The findings suggest that: 1) Firms’ access to regional knowledge spillovers (from businesses and higher education institutions) is more significantly associated with high-impact growth of UK firms in comparison to foreign firms, 2) Because high-tech sectors have greater use of knowledge spillovers (compared to low-tech sectors), high-tech sectors are more associated with high-impact growth, but the relationship is stronger for UK firms compared to foreign firms, 3) Because small firms have greater need for knowledge spillovers (relative to large firms), there is a negative relationship between firm size and high-impact growth, but the negative relationship is greater for UK firms in comparison to foreign firms.

Keywords: entrepreneurship, high-growth, indigenous firms, foreign firms, small firms, large firms

Procedia PDF Downloads 422
21068 Detection of Resistive Faults in Medium Voltage Overhead Feeders

Authors: Mubarak Suliman, Mohamed Hassan

Abstract:

Detection of downed conductors occurring with high fault resistance (reaching kilo-ohms) has always been a challenge, especially in countries like Saudi Arabia, on which earth resistivity is very high in general (reaching more than 1000 Ω-meter). The new approaches for the detection of resistive and high impedance faults are based on the analysis of the fault current waveform. These methods are still under research and development, and they are currently lacking security and dependability. The other approach is communication-based solutions which depends on voltage measurement at the end of overhead line branches and communicate the measured signals to substation feeder relay or a central control center. However, such a detection method is costly and depends on the availability of communication medium and infrastructure. The main objective of this research is to utilize the available standard protection schemes to increase the probability of detection of downed conductors occurring with a low magnitude of fault currents and at the same time avoiding unwanted tripping in healthy conditions and feeders. By specifying the operating region of the faulty feeder, use of tripping curve for discrimination between faulty and healthy feeders, and with proper selection of core balance current transformer (CBCT) and voltage transformers with fewer measurement errors, it is possible to set the pick-up of sensitive earth fault current to minimum values of few amps (i.e., Pick-up Settings = 3 A or 4 A, …) for the detection of earth faults with fault resistance more than (1 - 2 kΩ) for 13.8kV overhead network and more than (3-4) kΩ fault resistance in 33kV overhead network. By implementation of the outcomes of this study, the probability of detection of downed conductors is increased by the utilization of existing schemes (i.e., Directional Sensitive Earth Fault Protection).

Keywords: sensitive earth fault, zero sequence current, grounded system, resistive fault detection, healthy feeder

Procedia PDF Downloads 111
21067 Effect of Yogurt on Blood and Liver Lipids Lavel in Rats

Authors: Nora Mohammed Al-Kehayez

Abstract:

This present investigation was performed to study the effect of low fat yogurt on serum and liver lipids profile of male albino rats (weighing 100 g+or- 5 gram) when fed balanced or high fat high cholesterol diets and given yogurt ad libitum compared with control groups. Rats were divided into 4 groups, each group contains 6 rats. The groups of rats were fed as follows: Group(1) was fed balanced diet + water(control). Group(2) was fed balanced diet + low fat yogurt. Group(3) was fed high fat high cholesterol diet + water(Control). Group(4) was fed high fat high cholesterol diet + low fat yogurt. The obtained results could be summarized as follows: When rats were given low fat yogurt and fed balanced or high fat high cholesterol diets a significantly greater weight gains resulted in comparison with the control groups given water instead of yogurt. The data on the weights of liver and heart expressed' as percentage increased the body weight in case of rats which were fed balanced diet with low fat yogurt while in case of rats which were fed high fat high cholesterol diet with low fat yogurt the increment scenes to be less. Results of serum cholesterol levels in serum of rats were given balanced or high fat high cholesterol diets and consuming low fat yogurt was showed a significant reduction values. However the low fat yogurt produced the highest significant decrease values. The values of serum cholesterol go hand in hand with serum lipoprotein fractions in rats given low fat yogurt with both balanced or high fat high cholesterol diets. An increase of high density lipoprotein HDL-C and a decrease of low density lipoprotein LDL-C values were obtained. When rats ingested low fat yogurt a significant decrease in serum and liver triglycerides content was obtained wether with balanced or high fat high cholesterol diets. Rats consuming high fat high cholesterol diets with water showed a significant increase in liver total lipids, total cholesterol and phospholipides levels in comparison with the same liver parameters in rats given balanced diet with water. Supplement with low fat yogurt significantly suppressed these effects.

Keywords: yogurt, lipids profile, albino, rats

Procedia PDF Downloads 415