Search results for: security measures in tourism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6952

Search results for: security measures in tourism

6052 Agritourism Potentials in Oman: An Overview with Visionary for Adoption

Authors: A. Al Hinai, H. Jayasuriya, H. Kotagama

Abstract:

Most Gulf Cooperation Council (GCC) countries with oil-based economy like Oman are looking for other potential revenue generation options as the crude oil price is regularly fluctuating due to changing geopolitical environment. Oman has advantage of possessing world-heritage nature tourism hotspots around the country and the government is making investments and strategies to uplift the tourism industry following Oman Vision 2040 strategies. Oman’s agriculture is not significantly contributing to the economy, but possesses specific and diversified arid cropping systems. Oman has modern farms; nevertheless some of the agricultural production activities are done with cultural practices and styles that would be attractive to tourists. The aim of this paper is to investigate the potentials for promoting agritourism industry in Oman; recognize potential sites, commodities and activities, and predict potential revenue generation as a projection from that of the tourism sector. Moreover, the study enables to foresee possible auxiliary advantages of agritourism such as, empowerment of women and youth, enhancement in the value-addition industry for agricultural produce through technology transfer and capacity building, and producing export quality products. Agritourism could increase employability, empowerment of women and youth, improve value-addition industry and export-oriented agribusiness. These efforts including provision of necessary technology-transfer and capacity-building should be rendered by the collaboration of academic institutions, relevant ministries and other public and private sector stakeholders.

Keywords: agritourism, nature-based tourism, potentials, revenue generation, value addition

Procedia PDF Downloads 131
6051 Authenticity from the Perspective of Locals: What Prince Edward Islanders Had to Say about Authentic Tourism Experiences

Authors: Susan C. Graham

Abstract:

Authenticity has grown to be ubiquitous within the tourism vernacular. Yet, agreement regarding what authenticity means in relation to tourism remains nebulous. In its simplest form, authenticity in tourism refers to products and experiences that provide insights into the social, cultural, economic, natural, historical, and political life of a place. But this definition is unwieldy in its scope and may not help industry leaders nor tourist in identifying that which is authentic. Much of what is projected as authentic is a carefully curated and crafted message developed by marketers to appeal to visitors and bears little resemblance to the everyday lives of locals. So perhaps one way to identify authentic tourism experiences is to ask locals themselves. The purpose of this study was to explore the perspectives of locals with respect to what constituted an authentic tourism experience in Prince Edward Island (PEI), Canada. Over 600 volunteers in a tourism research panel were sent a survey asking them to describe authentic PEI experiences within ten sub-categories relevant to the local tourism industry. To make participation more manageable, each respondent was asked their perspectives on any three of the tourism sub-categories. Over 400 individuals responded, providing 1391 unique responses. The responses were grouped thematically using interpretive phenomenological analysis whereby the participants’ responses were clustered into higher order groups to extract meaning. Two interesting thematic observations emerged: first, that respondents tended to clearly articulate and differentiate between intra- versus interpersonal experiences as a means of authentically experiencing PEI; and second, while respondents explicitly valued unstaged experiences over staged, several exceptions to this general rule were expressed. Responses could clearly be grouped into those that emphasized “going off the beaten path,” “exploring pristine and untouched corners,” “lesser known,” “hidden”, “going solo,” and taking the opportunity to “slow down.” Each of these responses was “self” centered, and focused on the visitor discovering and exploring in search of greater self-awareness and inner peace. In contrast, other responses encouraged the interaction of visitors with locals as a means of experiencing the authentic place. Respondents sited “going deep-sea fishing” to learn about local fishers and their communities, stopping by “local farm stands” and speaking with farmers who worked the land for generations,” patronizing “local restaurants, pubs, and b&bs”, and partaking in performances or exhibits by local artists. These kinds of experiences, the respondents claimed, provide an authentic glimpse into a place’s character. The second set of observations focused on the distinction between staged and unstaged experiences, with respondents overwhelmingly advocating for unstaged. Responses were clear in shunning “touristy,” “packaged,” and “fake” offerings for being inauthentic and misrepresenting the place as locals view it. Yet many respondents made exceptions for certain “staged” experiences, including (quite literally) the stage production of Anne of Green Gables based on the novel of the same name, the theatrical re-enactment of the founding of Canada, and visits to PEI’s many provincial and national parks, all of which respondents considered both staged and authentic at the same time.

Keywords: authentic, local, Prince Edward Island, tourism

Procedia PDF Downloads 259
6050 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 71
6049 Mythical Geography, Collective Imaginary and Spiritual Patrimony in the Romanian Carpathians: A Tourist Image Component

Authors: Cosmin-Gabriel Porumb-Ghiurco, Dumitrana Fiț-Iordache, Szőke Árpád

Abstract:

The literature incorporating geographical or tourist-geographical themes and explicit references to the Carpathian area is extremely abundant. Through this paper, we attempt to “undermine” the traditional, tourist-geographical approaches of the Carpathian Arch by targeting an aspect often regarded as marginal but which, if examined, even only empirically, takes the form of a vast problem with multidisciplinary vocation. Therefore, we propose a more extravagant yet pro-touristic approach to the Romanian Carpathian geo-space. Consequently, the explicit goal of this approach consists precisely in broadening the multidisciplinary, essentially geographic scope of the research, the vision and mental representation of the Carpathian area by advancing a lever that would symbolize a different kind of unification between geography and tourism on a more intimate, subtle, mythological and archetypal level. The spiritual and mercantile dimensions of the tourism field in general and of the local Carpathian tourism can meld harmoniously together in order to create a common territorial reality of referral and favorable perspectives for the consolidation of their symbiotic relationship.

Keywords: tourist image, mythical geography, collective imaginary, spiritual patrimony, Carpathians

Procedia PDF Downloads 89
6048 Health Tourists in Iran and Cultural Prejudices

Authors: Naeemeh Silvari

Abstract:

The tourism industry is important for different nations in two ways. Apart from economic benefits, it provides a basis for getting acquainted with the culture of different regions of the world. Depending on the capacities and contexts of their geography, countries try to attract more people to their country in different ways. Health tourism has been an important branch of the tourism industry in recent years, and many countries around the world are trying to make progress in this field and attract many tourists from around the world. Iran, like many developing countries in the Middle East and East Asia, is trying to improve and develop tourist attractions in the field of health. Due to the cheapness of providing medical services to tourists, many people have traveled to Iran for medical and health care. However, there is a long way to go before recognizing and reaching the desired position in this field. Due to the direct relationship between tourism and culture, the negative attitude towards the context of Iran has caused foreign travelers not to choose this country as their tourist destination. In this article, we tried to study the change in their attitude towards Iran by using semi-structured interviews of foreign travelers who traveled to Iran for treatment and medical services. The text of the interviews was coded and analyzed by MAX QDA software. Many of the people in the sample were from Middle Eastern and Arabic-speaking countries. Influenced by the media, they felt rejected by the Iranians before the trip. During their stay in Iran and in connection with the health care staff, in the first stage, they pointed out that many of their anxieties about the kind of treatment of Iranians have been allayed. In addition to the satisfaction with the medical services provided, they considered the atmosphere of Iranians' interaction with foreign travelers to be relatively appropriate, and some stated that Iran would be the destination of their leisure trip in the future. At the end of the research, policymakers were suggested that in order to resolve cultural contradictions rooted in values, they should first be recognized and seek to use other opportunities to resolve contradictions and form interactions with other cultures.

Keywords: cultural conflict, health tourism, cultural prejudice, advertising and media

Procedia PDF Downloads 73
6047 Environmental Users’ Perceptions on Tourism in the Grangettes Nature Reserve, Switzerland

Authors: Ralph Lugon, Randolf Ramseyer

Abstract:

The beauty and quality of the natural heritage can be appreciated in different ways by different users, but the delicate balance of the environment in a nature reserve must be respected. The case of the territorial anchorage of the Grangettes natural reserve gives an interesting insight into the users' perception of the environmental constraints and standards of tourist activities. The nature reserve was once conceived as a sanctuary of natural heritage, a place where flora and fauna could flourish with minimal human interference. However, over time and with the transition to modernity, the values and meanings of the reserve have changed for visitors and the people living in the surrounding area. Today, The Grangettes nature reserve is a place of relaxation for urban dwellers with limited knowledge of nature and a lack of awareness of conservation issues. As a result, the reserve is now threatened by the negative impacts of human activities and mass tourism on its environment. Les Grangettes is a nature reserve that faces the challenge of preserving biodiversity while managing tourist flows. Ways must be found to accommodate new types of visitors from towns and cities who are looking for new activities, quality services and facilities, as well as aesthetic inspiration. To ensure the long-term conservation of the area, the flow of tourists must be carefully controlled. Through a dual qualitative-quantitative approach in 2021-22, this paper explores new visitor trends, changes in the reserve, and potential consequences for other stakeholders in the ecosystem. The purpose of this research is to assess users' perceptions of environmental constraints and standards on tourist activities in a nature reserve.

Keywords: outdoor recreation, nature-based tourism, over tourism, protected area, user's perceptions

Procedia PDF Downloads 74
6046 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 372
6045 The Relationship between Rhythmic Complexity and Listening Engagement as a Proxy for Perceptual Interest

Authors: Noah R. Fram

Abstract:

Although it has been confirmed by multiple studies, the inverted-U relationship between stimulus complexity and preference (liking) remains contentious. Research aimed at substantiating the model are largely reliant upon anecdotal self-assessments of subjects and basic measures of complexity, leaving potential confounds unresolved. This study attempts to address the topic by assessing listening time as a behavioral correlate of liking (with the assumption that engagement prolongs listening time) and by looking for latent factors underlying several measures of rhythmic complexity. Participants listened to groups of rhythms, stopping each one when they started to lose interest and were asked to rate each rhythm in each group in terms of interest, complexity, and preference. Subjects were not informed that the time spent listening to each rhythm was the primary measure of interest. The hypothesis that listening time does demonstrate the same inverted-U relationship with complexity as verbal reports of liking was confirmed using a variety of metrics for rhythmic complexity, including meter-dependent measures of syncopation and meter-independent measures of entropy.

Keywords: complexity, entropy, rhythm, syncopation

Procedia PDF Downloads 165
6044 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 326
6043 Ecolodging as an Answer for Sustainable Development and Successful Resource Management: The Case of North West Coast in Alexandria

Authors: I. Elrouby

Abstract:

The continued growth of tourism in the future relies on maintaining a clean environment by achieving sustainable development. The erosion and degradation of beaches, the deterioration of coastal water quality, visual pollution of coastlines by massive developments, all this has contributed heavily to the loss of the natural attractiveness for tourism. In light of this, promoting the concept of sustainable coastal development is becoming a central goal for governments and private sector. An ecolodge is a small hotel or guesthouse that incorporates local architectural, cultural and natural characteristics, promotes environmental conservation through minimizing the use of waste and energy and produces social and economic benefits for local communities. Egypt has some scattered attempts in some areas like Sinai in the field of ecolodging. This research tends to investigate the potentials of the North West Coast (NWC) in Alexandria as a new candidate for ecolodging investments. The area is full of primitive natural and man-made resources. These, if used in an environmental-friendly way could achieve cost reductions as a result of successful resource management for investors on the one hand, and coastal preservation on the other hand. In-depth interviews will be conducted with stakeholders in the tourism sector to examine their opinion about the potentials of the research area for ecolodging developments. The candidates will be also asked to rate the importance of the availability of certain environmental aspects in such establishments such as the uses of resources that originate from local communities, uses of natural power sources, uses of an environmental-friendly sewage disposal, forbidding the use of materials of endangered species and enhancing cultural heritage conservation. The results show that the area is full of potentials that could be effectively used for ecolodging investments. This if efficiently used could attract ecotourism as a supplementary type of tourism that could be promoted in Alexandria aside cultural, recreational and religious tourism.

Keywords: Alexandria, ecolodging, ecotourism, sustainability

Procedia PDF Downloads 193
6042 Study on the Legend of Dayi in China

Authors: Zhiguo Ju

Abstract:

Both ancient written documents and archaeological studies showed that the ancient Chinese was people who worshiped the Sun God. There is a legend of Dayi in China, however, told a story of Dayi, an ancient hero who sacrificed his life to shoot nine suns out of the ten in the sky, restored the order of the universe, and saved the people’s life. By investigating its oral inheritance and folk customs, we found that the story was originated from Rizhao, the east coralline in east China. This could provide valuable cultural resources and could be used in local tourism. How the Sun-worshipping-people developed such a contradictory legend, how was it be carried by generations, and how to use it as a cultural source to promote the local tourism was discussed.

Keywords: Legend of Dayi, sun worship, ancient Chinese, China

Procedia PDF Downloads 680
6041 Comparative Study of Mechanical and Physiological Gait Efficiency Following Anterior Cruciate Ligament Reconstruction

Authors: Radwa E. Sweif, Amira A. A. Abdallah

Abstract:

Background: Evaluation of gait efficiency is used to examine energy consumption especially in patients with movement disorders. Hypothesis/Purpose: This study compared the physiological and mechanical measures of gait efficiency between patients with ACL reconstruction (ACLR) and healthy controls and correlated among these measures. Methods: Seventeen patients with ACLR and sixteen healthy controls with mean ± SD age 23.06±4.76 vs 24.85±6.47 years, height 173.93±6.54 vs 175.64±7.37cm, and weight 74.25±12.1 vs 76.52±10.14 kg, respectively, participated in the study. The patients were operated on six months prior to testing. They should have completed their accelerated rehabilitation program during this period. A 3D motion analysis system was used for collecting the mechanical measures (Biomechanical Efficiency Quotient (BEQ), the maximum degree of knee internal rotation during stance phase and speed of walking). The physiological measures (Physiological Cost Index (PCI) and Rate of Perceived Exertion (RPE)) were collected after performing the 6- minute walking test. Results: MANOVA showed that the maximum degree of knee internal rotation, PCI, and RPE increased and the speed decreased significantly (p<0.05) in the patients compared with the controls with no significant difference for the BEQ. Finally, there were significant (p<0.05) positive correlations between each of the PCI & RPE and each of the BEQ, speed of walking and the maximum degree of knee internal rotation in each group. Conclusion: It was concluded that there are alterations in both mechanical and physiological measures of gait efficiency in patients with ACLR after being rehabilitated, clarifying the need for performing additional endurance as well as knee stability training programs. Moreover, the positive correlations indicate that using either of the mechanical or physiological measures for evaluating gait efficiency is acceptable.

Keywords: ACL reconstruction, mechanical, physiological, gait efficiency

Procedia PDF Downloads 433
6040 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 141
6039 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 352
6038 Moving beyond Medical Tourism: An Analysis of Intra-Regional Medical Mobility in the Global South

Authors: Tyler D. Cesarone, Tatiana M. Wugalter

Abstract:

The movement of patients from the Global North to the Global South in pursuit of inexpensive healthcare and touristic experiences dominates the academic discourse on international medical travel (IMT). However, medical travel exists in higher numbers between Global South countries as patients who lack trust in, and feel disenfranchised by, their national healthcare systems seek treatment in nearby countries. Through a review of the existing literature, this paper examines patterns of IMT in the Middle East, Southeast Asia, and Southern Africa, distinguishing North-South medical tourism from South-South intra-regional medical mobility (IRMM). Evidence from these case studies demonstrates that notions of medical distrust and disenfranchisement, rooted in low-resourced and poor quality healthcare systems, are key drivers of IRMM in the Global South. The movement of patients from lower income to proximate higher income countries not only reveals tensions between patients and their healthcare systems but widens gaps in the quality of healthcare between departing and destination countries. In analyzing these cross-regional similarities, the paper moves beyond the current literature’s focus on singular case studies to expose global patterns of South-South IRMM. This presents a shift from the traditional focus on North-South medical tourism, demonstrating how disparities in healthcare systems both influence and are influenced by IRMM.

Keywords: global South, healthcare quality, international medical travel (IMT), intra-regional medical mobility (IRMM), medical disenfranchisement, medical distrust, medical tourism

Procedia PDF Downloads 396
6037 Clustering Performance Analysis using New Correlation-Based Cluster Validity Indices

Authors: Nathakhun Wiroonsri

Abstract:

There are various cluster validity measures used for evaluating clustering results. One of the main objectives of using these measures is to seek the optimal unknown number of clusters. Some measures work well for clusters with different densities, sizes and shapes. Yet, one of the weaknesses that those validity measures share is that they sometimes provide only one clear optimal number of clusters. That number is actually unknown and there might be more than one potential sub-optimal option that a user may wish to choose based on different applications. We develop two new cluster validity indices based on a correlation between an actual distance between a pair of data points and a centroid distance of clusters that the two points are located in. Our proposed indices constantly yield several peaks at different numbers of clusters which overcome the weakness previously stated. Furthermore, the introduced correlation can also be used for evaluating the quality of a selected clustering result. Several experiments in different scenarios, including the well-known iris data set and a real-world marketing application, have been conducted to compare the proposed validity indices with several well-known ones.

Keywords: clustering algorithm, cluster validity measure, correlation, data partitions, iris data set, marketing, pattern recognition

Procedia PDF Downloads 102
6036 The Integrated Urban Strategies Based on Deep Urban History and Modern Technology Study: Tourism and Leisure Industries as Driving Force to Reactivate Historical Area

Authors: Cheng Li, Jie Shen, Yutian Tang

Abstract:

Embracing the upcoming era of urbanization with the challenges of limitation of resources, disappearing cultural identities and conflicts among different groups of stakeholders, new integrated approaches are offered in our urban practice to help decision-makers and stakeholders frame and develop well-conceived, practical strategies for urban developing trajectories to approach urban-level sustainability in multiple social, cultural, ecological dimensions. Through bottom-up participation, we take advantage of tourism and leisure industries as driving forces for urbanization in China to promote integrated sustainable systems, with the hope of approaching both historical and ecological aspects of urban sustainability; and also thanks to top-down participation, we have codes, standards and rules established by the governments to strengthen the implementation of ecological urban sustainability. The results are monitored and evaluated experimentally and multidimensionally and the sustainable systems we constructed with local stakeholder groups turned out to be effective. The presentation of our selected projects would indicate our different focuses on urban sustainability.

Keywords: urban sustainability, integrated urban strategy, tourism and leisure industries, history, modern technology

Procedia PDF Downloads 376
6035 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 509
6034 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 329
6033 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 327
6032 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 410
6031 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 380
6030 A Study of Social and Cultural Context for Tourism Management by Community Kamchanoad District, Amphoe Ban Dung, Udon Thani Province

Authors: Phusit Phukamchanoad, Chutchai Ditchareon, Suwaree Yordchim

Abstract:

This research was to study on background and social and cultural context of Kamchanoad community for sustainable tourism management. All data was collected through in-depth interview with village headmen, community committees, teacher, monks, Kamchanoad forest field officers and respected senior citizen above 60 years old in the community who have lived there for more than 40 years. Altogether there were 30 participants for this research. After analyzing the data, content from interview and discussion, Kamchanoad has both high land and low land in the region as well as swamps that are very capable of freshwater animals’ conservation. Kamchanoad is also good for agriculture and animal farming. 80% of Kamchanoad’s land are forest, freshwater and rice farms. Kamchanoad was officially set up as community in 1994 as “Baan Nonmuang”. Inhabitants in Kamchanoad make a living by farming based on sufficiency economy. They have rice farm, eucalyptus farm, cassava farm and rubber tree farm. Local people in Kamchanoad still believe in the myth of Srisutto Naga. They are still religious and love to preserve their traditional way of life. In order to understand how to create successful tourism business in Kamchanoad, we have to study closely on local culture and traditions. Outstanding event in Kamchanoad is the worship of Grand Srisutto, which is on the full-moon day of 6th month or Visakhabucha Day. Other big events are also celebration at the end of Buddhist lent, Naga firework, New Year celebration, Boon Mahachart, Songkran, Buddhist Lent, Boon Katin and Loy Kratong. Buddhism is the main religion in Kamchanoad. The promotion of tourism in Kamchanoad is expected to help spreading more income for this region. More infrastructures will be provided for local people as well as funding for youth support and people activities.

Keywords: social and culture area, tourism management, Kamchanoad Community, Udon Thani Province

Procedia PDF Downloads 212
6029 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 341
6028 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 123
6027 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 676
6026 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'

Authors: Arianna Vedaschi

Abstract:

This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.

Keywords: radicalization, free speech, international terrorism, national security

Procedia PDF Downloads 195
6025 Hosoya Polynomials of Mycielskian Graphs

Authors: Sanju Vaidya, Aihua Li

Abstract:

Vulnerability measures and topological indices are crucial in solving various problems such as the stability of the communication networks and development of mathematical models for chemical compounds. In 1947, Harry Wiener introduced a topological index related to molecular branching. Now there are more than 100 topological indices for graphs. For example, Hosoya polynomials (also called Wiener polynomials) were introduced to derive formulas for certain vulnerability measures and topological indices for various graphs. In this paper, we will find a relation between the Hosoya polynomials of any graph and its Mycielskian graph. Additionally, using this we will compute vulnerability measures, closeness and betweenness centrality, and extended Wiener indices. It is fascinating to see how Hosoya polynomials are useful in the two diverse fields, cybersecurity and chemistry.

Keywords: hosoya polynomial, mycielskian graph, graph vulnerability measure, topological index

Procedia PDF Downloads 64
6024 FRATSAN: A New Software for Fractal Analysis of Signals

Authors: Hamidreza Namazi

Abstract:

Fractal analysis is assessing fractal characteristics of data. It consists of several methods to assign fractal characteristics to a dataset which may be a theoretical dataset or a pattern or signal extracted from phenomena including natural geometric objects, sound, market fluctuations, heart rates, digital images, molecular motion, networks, etc. Fractal analysis is now widely used in all areas of science. An important limitation of fractal analysis is that arriving at an empirically determined fractal dimension does not necessarily prove that a pattern is fractal; rather, other essential characteristics have to be considered. For this purpose a Visual C++ based software called FRATSAN (FRActal Time Series ANalyser) was developed which extract information from signals through three measures. These measures are Fractal Dimensions, Jeffrey’s Measure and Hurst Exponent. After computing these measures, the software plots the graphs for each measure. Besides computing three measures the software can classify whether the signal is fractal or no. In fact, the software uses a dynamic method of analysis for all the measures. A sliding window is selected with a value equal to 10% of the total number of data entries. This sliding window is moved one data entry at a time to obtain all the measures. This makes the computation very sensitive to slight changes in data, thereby giving the user an acute analysis of the data. In order to test the performance of this software a set of EEG signals was given as input and the results were computed and plotted. This software is useful not only for fundamental fractal analysis of signals but can be used for other purposes. For instance by analyzing the Hurst exponent plot of a given EEG signal in patients with epilepsy the onset of seizure can be predicted by noticing the sudden changes in the plot.

Keywords: EEG signals, fractal analysis, fractal dimension, hurst exponent, Jeffrey’s measure

Procedia PDF Downloads 463
6023 Multi-Criteria Nautical Ports Capacity and Services Planning

Authors: N. Perko, N. Kavran, M. Bukljas, I. Berbic

Abstract:

This paper is a result of implemented research on proposed introduced methodology for nautical ports capacity planning by introducing a multi-criteria approach of defined criteria and impacts at the Adriatic Sea. The purpose was analysing the determinants -characteristics of infrastructure and services of nautical ports capacity allocated, especially nowadays due to COVID-19 pandemic, as crucial for the successful operation of nautical ports. Giving the importance of the defined priorities for short-term and long-term planning is essential not only in terms of the development of nautical tourism but also in terms of developing the maritime system, but unfortunately, this is not always carried out. Evaluation of the use of resources should follow from a detailed analysis of all aspects of resources bearing in mind that nautical tourism used resources in a sustainable manner and generate effects in the tourism and maritime sectors. Consequently, the identified multiplier effect of nautical tourism, which should be defined and quantified in detail, should be one of the major competitive products on the Croatian Adriatic and the Mediterranean. Research of nautical tourism is necessary to quantify the effects and required planning system development. In the future, the greatest threat to the long-term sustainable development of nautical tourism can be its further uncontrolled or unlimited and undirected development, especially under pressure markedly higher demand than supply for new moorings in the Mediterranean. Results of this implemented research are applicable to nautical ports management and decision-makers of maritime transport system development. This paper will present implemented research and obtained result-developed methodology for nautical port capacity planning -port capacity planning multi-criteria decision-making. A proposed methodological approach of multi-criteria capacity planning includes four criteria (spatial - transport, cost - infrastructure, ecological and organizational criteria, and additional services). The importance of the criteria and sub-criteria is evaluated and carried out as the basis for sensitivity analysis of the importance of the criteria and sub-criteria. Based on the analysis of the identified and quantified importance of certain criteria and sub-criteria, as well as sensitivity analysis and analysis of changes of the quantified importance, scientific and applicable results will be presented. These obtained results have practical applicability by management of nautical ports in the planning of increasing capacity and further development and for the adaptation of existing nautical ports. Obtained research is applicable and replicable in other seas, and results are especially important and useful in this COVID-19 pandemic challenging maritime development framework.

Keywords: Adriatic Sea, capacity, infrastructures, maritime system, methodology, nautical ports, nautical tourism, service

Procedia PDF Downloads 176