Search results for: transportation security
3305 Solving 94-Bit ECDLP with 70 Computers in Parallel
Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai
Abstract:
Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.Keywords: Pollard's rho method, BN curve, Montgomery multiplication
Procedia PDF Downloads 2723304 Life Cycle Carbon Dioxide Emissions from the Construction Phase of Highway Sector in China
Authors: Yuanyuan Liu, Yuanqing Wang, Di Li
Abstract:
Carbon dioxide (CO2) emissions mitigation from road construction activities is one of the potential pathways to deal with climate change due to its higher use of materials, machinery energy consumption, and high quantity of vehicle and equipment fuels for transportation and on-site construction activities. Aiming to assess the environmental impact of the road infrastructure construction activities and to identify hotspots of emissions sources, this study developed a life-cycle CO2 emissions assessment framework covering three stages of material production, to-site and on-site transportation under the guidance of the principle of LCA ISO14040. Then streamlined inventory analysis on sub-processes of each stage was conducted based on the budget files from cases of highway projects in China. The calculation results were normalized into functional unit represented as ton per km per lane. Then a comparison between the amount of emissions from each stage, and sub-process was made to identify the major contributor in the whole highway lifecycle. In addition, the calculating results were used to be compared with results in other countries for understanding the level of CO2 emissions associated with Chinese road infrastructure in the world. The results showed that materials production stage produces the most of the CO2 emissions (for more than 80%), and the production of cement and steel accounts for large quantities of carbon emissions. Life cycle CO2 emissions of fuel and electric energy associated with to-site and on-site transportation vehicle and equipment are a minor component of total life cycle CO2 emissions from highway project construction activities. Bridges and tunnels are dominant large carbon contributor compared to the road segments. The life cycle CO2 emissions of road segment in highway project in China are slightly higher than the estimation results of highways in European countries and USA, about 1500 ton per km per lane. In particularly, the life cycle CO2 emissions of road pavement in majority cities all over the world are about 500 ton per km per lane. However, there is obvious difference between the cities when the estimation on life cycle CO2 emissions of highway projects included bridge and tunnel. The findings of the study could offer decision makers a more comprehensive reference to understand the contribution of road infrastructure to climate change, especially understand the contribution from road infrastructure construction activities in China. In addition, the identified hotspots of emissions sources provide the insights of how to reduce road carbon emissions for development of sustainable transportation.Keywords: carbon dioxide emissions, construction activities, highway, life cycle assessment
Procedia PDF Downloads 2693303 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 603302 Economic Development Impacts of Connected and Automated Vehicles (CAV)
Authors: Rimon Rafiah
Abstract:
This paper will present a combination of two seemingly unrelated models, which are the one for estimating economic development impacts as a result of transportation investment and the other for increasing CAV penetration in order to reduce congestion. Measuring economic development impacts resulting from transportation investments is becoming more recognized around the world. Examples include the UK’s Wider Economic Benefits (WEB) model, Economic Impact Assessments in the USA, various input-output models, and additional models around the world. The economic impact model is based on WEB and is based on the following premise: investments in transportation will reduce the cost of personal travel, enabling firms to be more competitive, creating additional throughput (the same road allows more people to travel), and reducing the cost of travel of workers to a new workplace. This reduction in travel costs was estimated in out-of-pocket terms in a given localized area and was then translated into additional employment based on regional labor supply elasticity. This additional employment was conservatively assumed to be at minimum wage levels, translated into GDP terms, and from there into direct taxation (i.e., an increase in tax taken by the government). The CAV model is based on economic principles such as CAV usage, supply, and demand. Usage of CAVs can increase capacity using a variety of means – increased automation (known as Level I thru Level IV) and also by increased penetration and usage, which has been predicted to go up to 50% by 2030 according to several forecasts, with possible full conversion by 2045-2050. Several countries have passed policies and/or legislation on sales of gasoline-powered vehicles (none) starting in 2030 and later. Supply was measured via increased capacity on given infrastructure as a function of both CAV penetration and implemented technologies. The CAV model, as implemented in the USA, has shown significant savings in travel time and also in vehicle operating costs, which can be translated into economic development impacts in terms of job creation, GDP growth and salaries as well. The models have policy implications as well and can be adapted for use in Japan as well.Keywords: CAV, economic development, WEB, transport economics
Procedia PDF Downloads 743301 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 1453300 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 143299 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1243298 Optimal Designof Brush Roll for Semiconductor Wafer Using CFD Analysis
Authors: Byeong-Sam Kim, Kyoungwoo Park
Abstract:
This research analyzes structure of flat panel display (FPD) such as LCD as quantitative through CFD analysis and modeling change to minimize the badness rate and rate of production decrease by damage of large scale plater at wafer heating chamber at semi-conductor manufacturing process. This glass panel and wafer device with atmospheric pressure or chemical vapor deposition equipment for transporting and transferring wafers, robot hands carry these longer and wider wafers can also be easily handled. As a contact handling system composed of several problems in increased potential for fracture or warping. A non-contact handling system is required to solve this problem. The panel and wafer warping makes it difficult to carry out conventional contact to analysis. We propose a new non-contact transportation system with combining air suction and blowout. The numerical analysis and experimental is, therefore, should be performed to obtain compared to results achieved with non-contact solutions. This wafer panel noncontact handler shows its strength in maintaining high cleanliness levels for semiconductor production processes.Keywords: flat panel display, non contact transportation, heat treatment process, CFD analysis
Procedia PDF Downloads 4163297 An Approach for Ensuring Data Flow in Freight Delivery and Management Systems
Authors: Aurelija Burinskienė, Dalė Dzemydienė, Arūnas Miliauskas
Abstract:
This research aims at developing the approach for more effective freight delivery and transportation process management. The road congestions and the identification of causes are important, as well as the context information recognition and management. The measure of many parameters during the transportation period and proper control of driver work became the problem. The number of vehicles per time unit passing at a given time and point for drivers can be evaluated in some situations. The collection of data is mainly used to establish new trips. The flow of the data is more complex in urban areas. Herein, the movement of freight is reported in detail, including the information on street level. When traffic density is extremely high in congestion cases, and the traffic speed is incredibly low, data transmission reaches the peak. Different data sets are generated, which depend on the type of freight delivery network. There are three types of networks: long-distance delivery networks, last-mile delivery networks and mode-based delivery networks; the last one includes different modes, in particular, railways and other networks. When freight delivery is switched from one type of the above-stated network to another, more data could be included for reporting purposes and vice versa. In this case, a significant amount of these data is used for control operations, and the problem requires an integrated methodological approach. The paper presents an approach for providing e-services for drivers by including the assessment of the multi-component infrastructure needed for delivery of freights following the network type. The construction of such a methodology is required to evaluate data flow conditions and overloads, and to minimize the time gaps in data reporting. The results obtained show the possibilities of the proposing methodological approach to support the management and decision-making processes with functionality of incorporating networking specifics, by helping to minimize the overloads in data reporting.Keywords: transportation networks, freight delivery, data flow, monitoring, e-services
Procedia PDF Downloads 1253296 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 3503295 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4043294 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 1193293 Shopping Centers and Public Transport: Study of the Shopping Centres Trips of Algiers City
Authors: Bakhrouri Sarah
Abstract:
The city of Algiers constitutes the first commercial pole of the country; 56.3% of its economic entities come from the commercial sector. Shopping centers are the new form of commerce that has emerged in the city since the 2000s. They are considered to be commercial and leisure poles and major generators of travel. However, shopping centers in the capital Algiers are poorly served by public transport, and their choice of location is mainly conditioned by the availability of land; accessibility by public transport does not appear to be an important criterion in the choice of their location. As a result, travel to and from these commercial centers is mainly by car, which breaks with the sustainability objectives of national transportation policy. Our study attempts to examine the impact of public transport accessibility of shopping centers on consumers' travel behaviour. The main objective of this research is to determine the link between the accessibility of these facilities, the use of private cars, and public transport modes. To this end, we analyze the choice of travel mode of consumers and the different factors that determine it by focusing on the influence of accessibility. The results showed a considerable influence of the accessibility on the travel behavior of the consumer in Algiers, so it is recommended to improve the accessibility of shopping centers by public transport in order to contribute to a modal shift.Keywords: accessibility, shopping centers trips, public transportation, Algiers
Procedia PDF Downloads 993292 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1393291 Green Supply Chain Design: A Mathematical Modeling Approach
Authors: Nusrat T. Chowdhury
Abstract:
Green Supply Chain Management (GSCM) is becoming a key to success for profitable businesses. The various activities contributing to carbon emissions in a supply chain are transportation, ordering and holding of inventory. This research work develops a mixed-integer nonlinear programming (MINLP) model that considers the scenario of a supply chain with multiple periods, multiple products and multiple suppliers. The model assumes that the demand is deterministic, the buyer has a limited storage space in each period, the buyer is responsible for the transportation cost, a supplier-dependent ordering cost applies for each period in which an order is placed on a supplier and inventory shortage is permissible. The model provides an optimal decision regarding what products to order, in what quantities, with which suppliers, and in which periods in order to maximize the profit. For the purpose of evaluating the carbon emissions, three different carbon regulating policies i.e., carbon cap-and-trade, the strict cap on carbon emission and carbon tax on emissions, have been considered. The proposed MINLP has been validated using a randomly generated data set.Keywords: green supply chain, carbon emission, mixed integer non-linear program, inventory shortage, carbon cap-and-trade
Procedia PDF Downloads 2393290 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
Abstract:
The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.Keywords: hospital, light fidelity, Li-Fi, medical devices, security
Procedia PDF Downloads 1023289 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3463288 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2263287 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1803286 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security
Authors: Carmen J. Savelli, Romy Conzade
Abstract:
Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.Keywords: food safety, food security, nutrition, policy
Procedia PDF Downloads 4213285 A Review and Classification of Maritime Disasters: The Case of Saudi Arabia's Coastline
Authors: Arif Almutairi, Monjur Mourshed
Abstract:
Due to varying geographical and tectonic factors, the region of Saudi Arabia has been subjected to numerous natural and man-made maritime disasters during the last two decades. Natural maritime disasters, such as cyclones and tsunamis, have been recorded in coastal areas of the Indian Ocean (including the Arabian Sea and the Gulf of Aden). Therefore, the Indian Ocean is widely recognised as the potential source of future destructive natural disasters that could affect Saudi Arabia’s coastline. Meanwhile, man-made maritime disasters, such as those arising from piracy and oil pollution, are located in the Red Sea and the Arabian Gulf, which are key locations for oil export and transportation between Asia and Europe. This paper provides a brief overview of maritime disasters surrounding Saudi Arabia’s coastline in order to classify them by frequency of occurrence and location, and discuss their future impact the region. Results show that the Arabian Gulf will be more vulnerable to natural maritime disasters because of its location, whereas the Red Sea is more vulnerable to man-made maritime disasters, as it is the key location for transportation between Asia and Europe. The results also show that with the aid of proper classification, effective disaster management can reduce the consequences of maritime disasters.Keywords: disaster classification, maritime disaster, natural disasters, man-made disasters
Procedia PDF Downloads 1893284 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues
Authors: Akram Waheb Nasef Alzordoky
Abstract:
The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 213283 Determinants of International Volatility Passthroughs of Agricultural Commodities: A Panel Analysis of Developing Countries
Authors: Tetsuji Tanaka, Jin Guo
Abstract:
The extant literature has not succeeded in uncovering the common determinants of price volatility transmissions of agricultural commodities from international to local markets, and further, has rarely investigated the role of self-sufficiency measures in the context of national food security. We analyzed various factors to determine the degree of price volatility transmissions of wheat, rice, and maize between world and domestic markets using GARCH models with dynamic conditional correlation (DCC) specifications and panel-feasible generalized least square models. We found that the grain autarky system has the potential to diminish volatility pass-throughs for three grain commodities. Furthermore, it was discovered that the substitutive commodity consumption behavior between maize and wheat buffers the volatility transmissions of both, but rice does not function as a transmission-relieving element, either for the volatilities of wheat or maize. The effectiveness of grain consumption substitution to insulate the pass-throughs from global markets is greater than that of cereal self-sufficiency. These implications are extremely beneficial for developing governments to protect their domestic food markets from uncertainty in foreign countries and as such, improves food security.Keywords: food security, GARCH, grain self-sufficiency, volatility transmission
Procedia PDF Downloads 1553282 Climate Change and Human Migration
Authors: Sungwoo Park
Abstract:
The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.Keywords: climate change, climate migration, global security, refugee crisis
Procedia PDF Downloads 3463281 Loading by Number Strategy for Commercial Vehicles
Authors: Ramalan Musa Yerima
Abstract:
The paper titled “loading by number” explained a strategy developed recently by Zonal Commanding Officer of the Federal Road Safety Corps of Nigeria, covering Sokoto, Kebbi and Zamfara States of Northern Nigeria. The strategy is aimed at reducing competition, which will invariably leads to the reduction in speed, reduction in dangerous driving, reduction in crash rate, reduction in injuries, reduction in property damages and reduction in death through road traffic crashes (RTC). This research paper presents a study focused on enhancing the safety of commercial vehicles. The background of this study highlights the alarming statistics related to commercial vehicle crashes in Nigeria with focus on Sokoto, Kebbi and Zamfara States, which often result in significant damage to property, loss of lives, and economic costs. The significance and aims is to investigate and propose effective strategy to enhance the safety of commercial vehicles. The study recognizes the pressing need for heightened safety measures in commercial transportation, as it impacts not only the well-being of drivers and passengers but also the overall public safety. To achieve the objectives, an examination of accident data, including causes and contributing factors, was performed to identify critical areas for improvement. The major finding of the study reveals that when competition comes into play within the realm of commercial driving, it has detrimental effects on road safety and resource management. Commercial drivers are pushed to complete their routes quickly, deliver goods on time or they pushed themselves to arrive quickly for more passengers and new contracts. This competitive environment, fuelled by internal and external pressures such as tight deadlines, poverty and greed, often leads to sad endings. The study recommend that if a strategy called loading by number is integrated with other multiple safety measures such as driver training programs, regulatory enforcement, and infrastructure improvements, commercial vehicle safety can be significantly enhanced. "Loading by Number” approach is design to ensure that the sequence of departure of drivers from motor park ‘A’ would be communicated to motor park officials of park ‘B’, which would be considered sequentially when giving them returning passengers, regardless of the first to arrive. In conclusion, this paper underscores the significance of improving the safety measures of commercial vehicles, as they are often larger and heavier than other vehicles on the road. Whenever they are involved in accidents, the consequences can be more severe. Commercial vehicles are also frequently involved in long-haul or interstate transportation, which means they cover longer distances and spend more time on the road. This increased exposure to driving conditions increases the probability of accidents occurring. By implementing the suggested measures, policymakers, transportation authorities, and industry stakeholders can work collectively towards ensuring a safer commercial transportation system.Keywords: commercial, safety, strategy, transportation
Procedia PDF Downloads 613280 Study of Components and Effective Factors on Organizational Commitment of Khoramabad Branchs Islamic Azad University’s Faculty Members
Authors: Mehry Daraei
Abstract:
The goal of this study was to survey the components and affective factors on organizational commitment of Islamic Azad university Khoramabad Baranch’s faculty members. The research method was correlation by causal modeling and data were gathered by questionnaire. Statistical society consisted of 147 faculty members in Islamic Azad University Khoramabad Branch and sample size was determined as 106 persons by Morgan’s sample table that were selected by class sampling. Correlation test, T-single group test and path analysis test were used for analysis of data. Data were analyzed by Lisrel software. The results showed that organizational corporate was the most effective element on organizational commitment and organizational corporate, experience work and organizational justice were only in direct relation with organizational commitment. Also, job security had direct and indirect effect on OC. Job security had effect on OC by gender. Gender variable had direct and indirect effect on OC. Gender had effect on OC by organizational corporate. Job opportunities out of university also had direct and indirect effect on OC, which means job opportunities had indirect effect on OC by organizational corporate.Keywords: organization, commitment, job security, Islamic Azad University
Procedia PDF Downloads 3233279 Secure Transfer of Medical Images Using Hybrid Encryption
Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 4433278 Impact of Global Climate Change on Economy of Pakistan: How to Ensure Sustainable Food and Energy Production
Authors: Sabahat Zahra
Abstract:
The purpose of this research is to present the changing global environment and its potential impacts on sustainable food and energy production at global level, particularly in Pakistan. The food and energy related-economic sector has been subjected to negative consequences due to recent extreme changes in weather conditions, particularly in developing countries. Besides continuous modifications in weather, population is also increasing by time, therefore it is necessary to take special steps and start effective initiatives to cope with the challenges of food and energy security to fight hunger and for economic stability of country. Severe increase in temperature and heat waves has also negative impacts on food production as well as energy sustainability. Energy (in terms of electricity) consumption has grown up than the production potential of the country as a consequence of increasing warm weather. Ultimately prices gone up when there is more consumption than production. Therefore, all these aspects of climate change are interrelated with socio-economic issues. There is a need to develop long-term policies on regional and national levels for maintainable economic growth. This research presents a framework-plan and recommendations for implementation needed to mitigate the potential threats due to global climate change sustainable food and energy production under climate change in the country.Keywords: climate changes, energy security, food security, global climate change
Procedia PDF Downloads 3503277 Northern Ghana’s Sustainable Food Systems: Evaluating the Impact of International Development
Authors: Maxwell Ladogo Abilla
Abstract:
As evidence from the 2007–2008 and 2010 global food and financial crises revealed that food systems were under stress, the idea of sustainable food systems rose to prominence in the discussion of food security. The idea suggests moving away from a conception of food security that emphasizes production in favor of one that is more socially and environmentally conscious and interested in tackling a wide range of issues that have rendered the food system dysfunctional. This study evaluates the efforts made by international development organizations to increase food security in the area, taking into account the persistence of poverty and food insecurity in northern Ghana, utilizing the idea of sustainable food systems as the evaluation criterion. The study used triangulation to address the research questions by combining qualitative interview data with documentary analysis. To better comprehend the concept of sustainability, a variety of discourses and concepts are used, which results in the development of eight doable objectives for attaining sustainable food systems. The study finds that the food system in northern Ghana is unsustainable because of three kinds of barriers, with the practical objectives of developing sustainable food systems serving as the assessment criteria (natural, cultural and economic, and institutional). According to an evaluation of the World Food Programme's development support in northern Ghana, regional challenges to attaining sustainable food systems continue to be unaddressed by global development initiatives. Due to institutional constraints, WFP's interventions fell short of their promise. By demonstrating the need for development partners to enhance institutional efficiency and coordination, enable marginalized communities to access their rights, and prioritize agricultural irrigation in the area, the study makes a contribution to development policy and practice in northern Ghana.Keywords: sustainable, food security, development, institutional
Procedia PDF Downloads 903276 A Study of the Interactions between the Inter-City Traffic System and the Spatial Structure Evolution in the Yangtze River Delta from Time and Space Dimensions
Authors: Zhang Cong, Cai Runlin, Jia Fengjiao
Abstract:
The evolution of the urban agglomeration spatial structure requires strong support of the inter-city traffic system. And the inter-city traffic system can not only meet the demand of the urban agglomeration transportation but also guide the economic development. To correctly understand the relationship between inter-city traffic planning and urban agglomeration can help the urban agglomeration coordinated developing with the inter-city traffic system. The Yangtze River Delta is one of the most representative urban agglomerations in China with strong economic vitality, high city levels, diversified urban space form, and improved transport infrastructure. With the promotion of industrial division in the Yangtze River Delta and the regional travel facilitation brought by inter-city traffic, the urban agglomeration is characterized by highly increasing of inter-city transportation demand, the urbanization of regional traffic, adjacent regional transportation links breaking administrative boundaries, the networked channels and so on. Therefore, the development of inter-city traffic system presents new trends and challenges. This paper studies the interactions between inter-city traffic system and regional economic growth, regional factor flow, and regional spatial structure evolution in the Yangtze River Delta from two dimensions of time and space. On this basis, the adaptability of inter-city traffic development mode and urban agglomeration space structure is analyzed. First of all, the coordination between urban agglomeration planning and inter-city traffic planning is judged from the planning level. Secondly, the coordination between inter-city traffic elements and industries and population distributions is judged from the perspective of space. Finally, the coordination of the cross-regional planning and construction of inter-city traffic system is judged. The conclusions can provide an empirical reference for intercity traffic planning in Yangtze River Delta region and other urban agglomerations, and it is also of great significance to optimize the allocation of urban agglomerations and the overall operational efficiency.Keywords: evolution, interaction, inter-city traffic system, spatial structure
Procedia PDF Downloads 311