Search results for: critical security studies
17078 Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment
Authors: James Hilton Williams
Abstract:
Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally.Keywords: impact assessment, infrastructure, tsunami impacts, vulnerability functions
Procedia PDF Downloads 16017077 Counter-Terrorism and Civil Society in Nigeria
Authors: Emeka Thaddues Njoku
Abstract:
Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.Keywords: counter-terrorism, civil society organizations, freedom, terrorism
Procedia PDF Downloads 38917076 Critical Terrain Slope Calculation for Locating Small Hydropower Plants
Authors: C. Vrekos, C. Evagelides, N. Samarinas, G. Arampatzis
Abstract:
As known, the water energy is a renewable and clean source of energy. Energy production from hydropower has been the first, and still is today a renewable source used to generate electricity. The optimal location and sizing of a small hydropower plant is a very important issue in engineering design which encourages investigation. The aim of this paper is to present a formula that can be utilized for locating the position of a small hydropower plant although there is a high dependence on economic, environmental, and social parameters. In this paper, the economic and technical side of the problem is considered. More specifically, there is a critical terrain slope that determines if the plant should be located at the end of the slope or not. Of course, this formula can be used for a first estimate and does not include detailed economic analysis. At the end, a case study is presented for the location of a small hydropower plant in order to demonstrate the validity of the proposed formula.Keywords: critical terrain slope, economic analysis, hydropower plant locating, renewable energy
Procedia PDF Downloads 20517075 On the Design of Electronic Control Unitsfor the Safety-Critical Vehicle Applications
Authors: Kyung-Jung Lee, Hyun-Sik Ahn
Abstract:
This paper suggests a design methodology for the hardware and software of the Electronic Control Unit (ECU) of safety-critical vehicle applications such as braking and steering. The architecture of the hardware is a high integrity system such that it incorporates a high performance 32-bit CPU and a separate Peripheral Control-Processor (PCP) together with an external watchdog CPU. Communication between the main CPU and the PCP is executed via a common area of RAM and events on either processor which are invoked by interrupts. Safety-related software is also implemented to provide a reliable, self-testing computing environment for safety critical and high integrity applications. The validity of the design approach is shown by using the Hardware-in-the-Loop Simulation (HILS) for Electric Power Steering (EPS) systems which consists of the EPS mechanism, the designed ECU, and monitoring tools.Keywords: electronic control unit, electric power steering, functional safety, hardware-in-the-loop simulation
Procedia PDF Downloads 29317074 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 27817073 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 29717072 Critical Reflection in Teaching and Learning Mathematics towards Perspective Transformation: Practices in Public and Private Schools
Authors: Arturo Tobias Calizon Jr.
Abstract:
The study investigated the practices in critical reflection being employed in teaching and learning mathematics in public and private schools for students to achieve perspective transformation in psychological, convictional and behavioral dimensions. There were 1,969 senior high school and college student-respondents selected at random from 33 schools. Process reflection is most commonly practiced in both public and private schools. Convictional dimension of perspective transformation is most frequently achieved. There is no significant difference in practices of process reflection between senior high school and college students. However, there is a significant difference in perspective transformation in behavioral dimension achieved by students from public and private schools. Also, there are significant differences in psychological, convictional and behavioral dimensions of perspective transformation achieved by senior high school and college students. There is a high and significant relationship between critical reflection practices and perspective transformation of students. The researcher concludes that there are teaching strategies that facilitate critical thinking, and there are learning activities that alter perspective of students about mathematics as an abstract field. The researcher further concludes that consistent use of appropriate teaching and learning activities could bring about perspective transformation in students with success.Keywords: critical reflection, perspective transformation, process reflection, convictional dimension, teaching and learning mathematics
Procedia PDF Downloads 15417071 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union
Authors: M. Adamczak-Retecka, O. Hołub-Śniadach
Abstract:
Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.Keywords: climate change, food security, sustainable food consumption, climate governance
Procedia PDF Downloads 17817070 Empowering Girls and Youth in Bangladesh: Importance of Creating Safe Digital Space for Online Learning and Education
Authors: Md. Rasel Mia, Ashik Billah
Abstract:
The empowerment of girls and youth in Bangladesh is a demanding issue in today's digital age, where online learning and education have become integral to personal and societal development. This abstract explores the critical importance of creating a secure online environment for girls and youth in Bangladesh, emphasizing the transformative impact it can have on their access to education and knowledge. Bangladesh, like many developing nations, faces gender inequalities in education and access to digital resources. The creation of a safe digital space not only mitigates the gender digital divide but also fosters an environment where girls and youth can thrive academically and professionally. This manuscript draws attention to the efforts through a mixed-method study to assess the current digital landscape in Bangladesh, revealing disparities in phone and internet access, online practices, and awareness of cyber security among diverse demographic groups. Moreover, the study unveils the varying levels of familial support and barriers encountered by girls and youth in their quest for digital literacy. It emphasizes the need for tailored training programs that address specific learning needs while also advocating for enhanced internet accessibility, safe online practices, and inclusive online platforms. The manuscript culminates in a call for collaborative efforts among stakeholders, including NGOs, government agencies, and telecommunications companies, to implement targeted interventions that bridge the gender digital divide and pave the way for a brighter, more equitable future for girls and youth in Bangladesh. In conclusion, this research highlights the undeniable significance of creating a safe digital space as a catalyst for the empowerment of girls and youth in Bangladesh, ensuring that they not only access but excel in the online space, thereby contributing to their personal growth and the advancement of society as a whole.Keywords: collaboration, cyber security, digital literacy, digital resources, inclusiveness
Procedia PDF Downloads 6017069 Sustainable Thermal Energy Storage Technologies: Enhancing Post-Harvest Drying Efficiency in Sub-Saharan Agriculture
Authors: Luís Miguel Estevão Cristóvão, Constâncio Augusto Machanguana, Fernando Chichango, Salvador Grande
Abstract:
Sub-Saharan African nations depend greatly on agriculture, a sector mainly marked by low production. Most of the farmers live in rural areas and employ basic labor-intensive technologies that lead to time inefficiencies and low overall effectiveness. Even with attempts to enhance farmers’ welfare through improved seeds and fertilizers, meaningful outcomes are yet to be achieved due to huge amounts of post-harvest losses. Such losses significantly endanger food security, economic stability, and result in unsustainable agricultural practices because more land, water, labor, energy, fertilizer, and other inputs must be used to produce more food. Drying, as a critical post-harvest process involving simultaneous heat and mass transfer, deserves attention. Among alternative green-energy sources, solar energy-based drying garners attention, particularly for small-scale farmers in remote communities. However, the intermittent nature of solar radiation poses challenges. To address this, energy storage solutions like rock-based thermal energy storage offer cost-effective solutions tailored to the needs of farmers. Methodologically, three solar dryers were constructed of metal, wood, and clay brick. Several tests were carried out with and without energy storage material. Notably, it has been demonstrated that soapstone stands out as a promising material due to its affordability and high specific energy capacity. By implementing these greener technologies, Sub-Saharan African countries could mitigate post-harvest losses, enhance food availability, improve nutrition, and promote sustainable resource utilization.Keywords: energy storage, food security, post-harvest, solar dryer
Procedia PDF Downloads 2217068 Women Soldiers in the Israel Defence Forces: Changing Trends of Gender Equality and Military Service
Authors: Dipanwita Chakravortty
Abstract:
Officially, the Israel Defence Forces (IDF) follows a policy of 'gender equality and partnership' which institutionalises norms regarding equal duty towards the nation. It reiterates the equality in unbiased opportunities and resources for Jewish men and women to participate in the military as equal citizens. At the same time, as a military institution, the IDF supports gender biases and crystallises the same through various interactions among women soldiers, male soldiers and the institution. These biases are expressed through various stages and processes in the military institution like biased training, discriminatory postings of women soldiers, lack of combat training and acceptance of sexual harassment. The gender-military debates in Israel is largely devoted to female emancipation and converting the militarised women’s experiences into mainstream debates. This critical scholarship, largely female-based and located in Israel, has been consistently critical of the structural policies of the IDF that have led to continued discriminatory practices against women soldiers. This has compelled the military to increase its intake of women soldiers and make its structural policies more gender-friendly. Nonetheless, the continued thriving of gender discrimination in the IDF resulted in scholars looking deep into the failure of these policies in bringing about a change. This article looks into two research objectives, firstly to analyse existing gender relations in the IDF which impact the practices and prejudices in the institution and secondly to look beyond the structural discrimination as part of the gender debates in the IDF. The proposed research uses the structural-functional model as a framework to study the discourses and norms emerging out of the interaction between gender and military as two distinct social institutions. Changing gender-military debates will be discussed in great detail to understanding the in-depth relation between the Israeli society and the military due to the conscription model. The main arguments of the paper deal with the functional aspect of the military service rather than the structural component of the institution. Traditional stereotypes of military institutions along with cultural notions of a female body restrict the complete integration of women soldiers despite favourable legislations and policies. These result in functional discriminations like uneven promotion, sexual violence, restructuring gender identities and creating militarised bodies. The existing prejudices encourage younger women recruits to choose from within the accepted pink-collared jobs in the military rather than ‘breaking the barriers.’ Some women recruits do try to explore new avenues and make a mark for themselves. Most of them face stiff discrimination but they accept it as part of military life. The cyclical logic behind structural norms leading to functional discrimination which then emphasises traditional stereotypes and hampers change in the institutional norms compels the IDF to continue to strive towards gender equality within the institution without practical realisation.Keywords: women soldiers, Israel Defence Forces, gender-military debates, security studies
Procedia PDF Downloads 17017067 Teaching Accounting through Critical Accounting Research: The Origin and Its Relevance to the South African Curriculum
Authors: Rosy Makeresemese Qhosola
Abstract:
South Africa has maintained the effort to uphold its guiding principles in terms of its constitution. The constitution upholds principles such as equity, social justice, peace, freedom and hope, to mention but a few. So, such principles are made to form the basis for any legislation and policies that are in place to guide all fields/departments of government. Education is one of those departments or fields and is expected to abide by such principles as outlined in their policies. Therefore, as expected education policies and legislation outline their intentions to ensure the development of students’ clear critical thinking capacity as well as their creative capacities by creating learning contexts and opportunities that accommodate the effective teaching and learning strategies, that are learner centered and are compatible with the prescripts of a democratic constitution of the country. The paper aims at exploring and analyzing the progress of conventional accounting in terms of its adherence to the effective use of principles of good teaching, as per policy expectations in South Africa. The progress is traced by comparing conventional accounting to Critical Accounting Research (CAR), where the history of accounting as intended in the curriculum of SA and CAR are highlighted. Critical Accounting Research framework is used as a lens and mode of teaching in this paper, since it can create a space for the learning of accounting that is optimal marked by the use of more learner-centred methods of teaching. The Curriculum of South Africa also emphasises the use of more learner-centred methods of teaching that encourage an active and critical approach to learning, rather than rote and uncritical learning of given truths. The study seeks to maintain that conventional accounting is in contrast with principles of good teaching as per South African policy expectations. The paper further maintains that, the possible move beyond it and the adherence to the effective use of good teaching, could be when CAR forms the basis of teaching. Data is generated through Participatory Action Research where the meetings, dialogues and discussions with the focused groups are conducted, which consists of lecturers, students, subject heads, coordinators and NGO’s as well as departmental officials. The results are analysed through Critical Discourse Analysis since it allows for the use of text by participants. The study concludes that any teacher who aspires to achieve in the teaching and learning of accounting should first meet the minimum requirements as stated in the NQF level 4, which forms the basic principles of good teaching and are in line with Critical Accounting Research.Keywords: critical accounting research, critical discourse analysis, participatory action research, principles of good teaching
Procedia PDF Downloads 30817066 Studies of Rule Induction by STRIM from the Decision Table with Contaminated Attribute Values from Missing Data and Noise — in the Case of Critical Dataset Size —
Authors: Tetsuro Saeki, Yuichi Kato, Shoutarou Mizuno
Abstract:
STRIM (Statistical Test Rule Induction Method) has been proposed as a method to effectively induct if-then rules from the decision table which is considered as a sample set obtained from the population of interest. Its usefulness has been confirmed by simulation experiments specifying rules in advance, and by comparison with conventional methods. However, scope for future development remains before STRIM can be applied to the analysis of real-world data sets. The first requirement is to determine the size of the dataset needed for inducting true rules, since finding statistically significant rules is the core of the method. The second is to examine the capacity of rule induction from datasets with contaminated attribute values created by missing data and noise, since real-world datasets usually contain such contaminated data. This paper examines the first problem theoretically, in connection with the rule length. The second problem is then examined in a simulation experiment, utilizing the critical size of dataset derived from the first step. The experimental results show that STRIM is highly robust in the analysis of datasets with contaminated attribute values, and hence is applicable to realworld data.Keywords: rule induction, decision table, missing data, noise
Procedia PDF Downloads 39517065 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 48217064 In Patribus Fidelium Leftist Discourses on Political Violence in Lebanon and Algeria: A Critical Discourse Analysis
Authors: Mehdi Heydari Sanglaji
Abstract:
The dramatic events of the 11 September, and their tragic repercussions, catapulted issues of the political violence in and from the ‘Muslim world’ onto the political discourse, be it in patriotic speeches of campaigning politicians or the TV and news punditry. Depending on what end of the political spectrum the politician/pundit pledges fealty to, the overall analyses of political violence in the West Asia and North Africa (WANA) tends towards two overarching categories: on the Right, the diagnosis has unanimously been, ‘they must hate our freedom.’ On the Left, however, there is the contention that the West has to be counted as the primary cause of such rage, for the years of plundering of lives and resources, through colonialism, the Cold War, coups, etc. All these analyses are premised on at least two presuppositions: the violence in and from the WANA region a) is always reactionary, in the sense that it happens only in response to something the West is or does; and b) must always already be condemned, as it is essentially immoral and wrong. It is the aim of this paper to challenge such viewpoints. Through a rigorous study of the historical discourses on political violence in the Leftist organizations active in Algeria and Lebanon, we claim there is a myriad of diverse reasons and justifications presented for advocating political violence in these countries that defy facile categorization. Inspecting such rhetoric for inciting political violence in Leftist discourses, and how some of these reasonings have percolated into other movements in the region (e.g., Islamist ones), will reveal a wealth of indigenous discourses on the subject that has been largely neglected by the Western Media punditry and even by the academia. The indigenous discourses on political violence, much of which overlaps with emancipatory projects in the region, partly follow grammar and logic, which may be different from those developed in the West, even by its more critical theories. Understanding so different epistemology of violence, and the diverse contexts in which political violence might be justifiable in the mind of ‘the other,’ necessitates a historical, materialist, and genealogical study of the discourse already in practice in the WANA region. In that regard, both critical terrorism studies and critical discourse analysis provide exemplary tools of analysis. Capitalizing on such tools, this project will focus on unearthing a history of thought that renders moot the reduction of all instances of violence in the region to an Islamic culture or imperialism/colonialism. The main argument in our research is that by studying the indigenous discourses on political violence, we will be far more equipped in understanding the reasons and the possible solutions for acts of terrorism in and from the region.Keywords: political violence, terrorism, leftist organizations, West Asia/North Africa
Procedia PDF Downloads 12817063 Interpersonal Emotion Regulation in Adolescence: An Enhanced Critical Incident Study
Authors: Setareh Shayanfar
Abstract:
Given the increasing importance of peer relationships during adolescence, the present study aimed to examine peer interactions that facilitate or hinder adolescents’ regulation of negative emotions. Using the Enhanced Critical Incident Technique, 1-hour semi-structured interviews were conducted with 16 junior high school adolescents. Participants were asked to recall situations when they experienced strong negative emotions during the past school year, indicate the peer interactions that helped or hindered their emotion regulation, and identify prospective interactions with the potential to help regulate their emotions. Data analysis extracted 182 critical incidents, including 109 helping incidents, 45 hindering incidents, and 28 wish list items, which generated 10 categories nested within four overarching themes: Positive Personal Support included (a) supportive presence, (b) expressing concern, (c) empathizing, and (d) encouraging and cheering up; while Strategy Transmission included (e) sharing perspective, and (f) giving advice; Activated Support included (g) taking action, and (h) distracting; while Negative Personal Interactions included (i) withdrawing and (j) punishing. Implications for mental health and service providers, as well as recommendations for future research, are presented.Keywords: adolescence, emotion regulation, enhanced critical incident technique, peers
Procedia PDF Downloads 14317062 Key Affecting Factors for Social Sustainability through Urban Green Space Planning
Authors: Raziyeh Teimouri, Sadasivam Karuppannan, Alpana Sivam, Ning Gu
Abstract:
Urban Green Space (UGS) is one of the most critical components of urban systems to create sustainable cities. UGS has valuable social benefits that closely correlate with people's life quality. Studying social sustainability factors that can be achieved by green spaces is required for optimal UGS planning to increase urban social sustainability. This paper aims to identify key factors that enhance urban social sustainability through UGS planning. To reach the goal of the study international experts’ survey has been conducted. According to the results of the survey analysis, factors of proper distribution, links to public transportation, walkable access, sense of place, social interactions, public education, safety and security, walkability and cyclability, physical activity and recreational facilities, suitability for all ages, disabled people, women, and children are among the key factors that should consider in UGS planning programs to promote urban social sustainability.Keywords: UGS, planning, social sustainability, key factors
Procedia PDF Downloads 7617061 The Burden and the Consequences of Waste Management in Nigeria: Geophysical Approach
Authors: Joseph Omeiza Alao
Abstract:
The wobbly state of waste management and the high level of environmental irresponsibility is a threat to environmental security, which invariably endangered public health, regional groundwater systems and atmospheric condition. The dumping of waste materials in water bodies and gutters and the frequent burning of waste materials heaped at dumpsites as well depict the highest level of environmental indiscipline. These unruly human factors have compelled this study to apply four different techniques for environmental impact assessment and the possible public health risks of poor waste management in Nigeria. The techniques include a geophysical survey (resistivity data acquisition), dispatched questionnaire surveys, physiochemical water analysis and a physical survey of several dumpsites. While the resistivity data indicates high-level dumpsite leachate invading the ground soil down to the water table, the physiochemical water analysis depicts high content of BOD (401 – 711) mg/l, COD (731 – 1312) mg/l, TDS (419 – 1871) mg/l and heavy metals (0.014 – 1.971) mg/l present in the regional groundwater systems, which have altered the chemistry of the regional groundwater. The resistivity data shows that the overburdened soil layer overlaying the regional groundwater systems was very low (4.5 Ωm – 151 Ωm) as against the existing data (180 Ωm – 3500 Ωm). However, the physical surveys and the dispatched questionnaire surveys explore the depth of environmental irresponsibility among the citizen. While the imprints of gross environmental indiscipline may be absolutely irreversible, adequate knowledge of the environmental implications of careless waste disposal. After a critical examination of the current waste management strategies in Nigeria, the study suggests a future direction for environmental security and sustainability. Several influential regional factors, such as geology, climatic conditions, and hydrology, were also discussed.Keywords: groundwater, environmental indiscipline, waste management, water analysis, leachate plumes, public health
Procedia PDF Downloads 6817060 Impact of Flexibility on Residential Buildings in Egypt
Authors: Aly Mohamed El Husseiny, Azza Ezz Abdelkader
Abstract:
There is a critical thin line between freedom of choice and randomness. The distance between imagination and perception and between perception and execution varies depending on numerous factors. While in developed areas residents have the opportunity and abilities to build flexible homes, residents in developing areas create their own dwellings in informal settlements, even though none of them is comfortable at home in the long run. This paper explores three factors: What residents really need, what they do with limited flexibility, and what they do when there are no limits, as in the case of informal settlements. This paper studies alteration to residential buildings and how they connect to the changes in people’s lifecycle in all past cases. This study also examines all approaches to flexibility, focusing on a social approach. The results of this study are based on three practical studies: Interviews with residents in an informal settlement (Eshash Mahfouz in Minya in Egypt), a civil study of buildings in a middle-class district, and a survey of residents from many countries, including Egypt, and interviews with a number of them to determine residents’ needs and the extent of renovations they made or would like to make to their homes.Keywords: flexibility, housing, freedom of choice, social, changes, residents
Procedia PDF Downloads 29817059 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 14117058 Strategic Innovation of Nanotechnology: Novel Applications of Biomimetics and Microfluidics in Food Safety
Authors: Boce Zhang
Abstract:
Strategic innovation of nanotechnology to promote food safety has drawn tremendous attentions among research groups, which includes the need for research support during the implementation of the Food Safety Modernization Act (FSMA) in the United States. There are urgent demands and knowledge gaps to the understanding of a) food-water-bacteria interface as for how pathogens persist and transmit during food processing and storage; b) minimum processing requirement needed to prevent pathogen cross-contamination in the food system. These knowledge gaps are of critical importance to the food industry. However, the lack of knowledge is largely hindered by the limitations of research tools. Our groups recently endeavored two novel engineering systems with biomimetics and microfluidics as a holistic approach to hazard analysis and risk mitigation, which provided unprecedented research opportunities to study pathogen behavior, in particular, contamination, and cross-contamination, at the critical food-water-pathogen interface. First, biomimetically-patterned surfaces (BPS) were developed to replicate the identical surface topography and chemistry of a natural food surface. We demonstrated that BPS is a superior research tool that empowers the study of a) how pathogens persist through sanitizer treatment, b) how to apply fluidic shear-force and surface tension to increase the vulnerability of the bacterial cells, by detaching them from a protected area, etc. Secondly, microfluidic devices were designed and fabricated to study the bactericidal kinetics in the sub-second time frame (0.1~1 second). The sub-second kinetics is critical because the cross-contamination process, which includes detachment, migration, and reattachment, can occur in a very short timeframe. With this microfluidic device, we were able to simulate and study these sub-second cross-contamination scenarios, and to further investigate the minimum sanitizer concentration needed to sufficiently prevent pathogen cross-contamination during the food processing. We anticipate that the findings from these studies will provide critical insight on bacterial behavior at the food-water-cell interface, and the kinetics of bacterial inactivation from a broad range of sanitizers and processing conditions, thus facilitating the development and implementation of science-based food safety regulations and practices to mitigate the food safety risks.Keywords: biomimetic materials, microbial food safety, microfluidic device, nanotechnology
Procedia PDF Downloads 35717057 Studies on Lucrative Process Layout for Medium Scale Industries
Authors: Balamurugan Baladhandapani, Ganesh Renganathan, V. R. Sanal Kumar
Abstract:
In this paper a comprehensive review on various factory layouts has been carried out for designing a lucrative process layout for medium scale industries. Industry data base reveals that the end product rejection rate is on the order of 10% amounting large profit loss. In order to avoid these rejection rates and to increase the quality product production an intermediate non-destructive testing facility (INDTF) has been recommended for increasing the overall profit. We observed through detailed case studies that while introducing INDTF to medium scale industries the expensive production process can be avoided to the defective products well before its final shape. Additionally, the defective products identified during the intermediate stage can be effectively utilized for other applications or recycling; thereby the overall wastage of the raw materials can be reduced and profit can be increased. We concluded that the prudent design of a factory layout through critical path method facilitating with INDTF will warrant profitable outcome.Keywords: intermediate non-destructive testing, medium scale industries, process layout design
Procedia PDF Downloads 50017056 Seismic Fragility of Base-Isolated Multi-Story Piping System in Critical Facilities
Authors: Bu Seog Ju, Ho Young Son, Yong Hee Ryu
Abstract:
This study is focused on the evaluation of seismic fragility of multi-story piping system installed in critical structures, isolated with triple friction pendulum bearing. The concept of this study is to isolate the critical building structure as well as nonstructural component, especially piping system in order to mitigate the earthquake damage and achieve the reliable seismic design. Then, the building system and multi-story piping system was modeled in OpenSees. In particular, the triple friction pendulum isolator was accounted for the vertical and horizontal coupling behavior in the building system subjected to seismic ground motions. Consequently, in order to generate the seismic fragility of base-isolated multi-story piping system, 21 selected seismic ground motions were carried out, by using Monte Carlo Simulation accounted for the uncertainties in demand. Finally, the system-level fragility curves corresponding to the limit state of the piping system was conducted at each T-joint system, which was commonly failure points in piping systems during and after an earthquake. Additionally, the system-level fragilities were performed to the first floor and second floor level in critical structures.Keywords: fragility, friction pendulum bearing, nonstructural component, seismic
Procedia PDF Downloads 14917055 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security
Authors: Magdalena Musiał-Karg
Abstract:
The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)
Procedia PDF Downloads 23817054 Uses of Fibrinogen Concentrate in the Management of Trauma-Induced Coagulopathy in the Prehospital Environment: A Scoping Review
Authors: Nura Khattab, Fayad Al-Haimus, Teruko Kishibe, Netanel Krugliak, Melissa McGowan, Brodie Nolan
Abstract:
Trauma-induced coagulopathy remains a significant contributor to mortality in severely injured patients. Fibrinogen is essential for early hemostasis and is recognized as the first coagulation factor to fall below critical levels, compromising the coagulation cascade. Early administration of fibrinogen concentrate may be feasible and effective to prevent coagulopathy. We conducted this scoping review to characterize the existing quantity of literature, and to explore the usage of prehospital fibrinogen concentrate products in improving clinical outcomes in trauma patients. Methods: A search strategy was developed in consultation with an information specialist. We searched MEDLINE, Embase, Cochrane, and Scopus from inception to May 6th 2024. English studies evaluating prehospital/military usage of fibrinogen concentrate in trauma patients were included. Studies were assessed by three independent reviewers for meeting inclusion and exclusion criteria. Reference lists of included articles were reviewed to identify additional studies meeting inclusion criteria. Clinical endpoints regarding fibrinogen concentrate were extracted and synthesized. Results: The literature search returned 1301 articles with seven studies meeting the inclusion criteria. Five studies (71%) were conducted in civilian settings and two studies (29%) were conducted in military settings. Of the included studies, three (43%) utilized a randomized control trial. We identified seven outcomes that compared varying concentrations of fibrinogen or fibrinogen concentrate to a placebo group. The outcomes included overall mortality, death from hemorrhage, thromboembolic events, clotting time, maximum clot firmness, clot stability at ER admission, and fibrinogen concentration at ER admission. Apart from thromboembolic events, all other reported outcomes showed statistically significant differences in group comparisons, determined using p values. The four (57%) non-clinical studies underscored the robustness, practicality, and degree of fibrinogen concentrate utilization in military environments and retrieval services. Conclusion: Preliminary research suggests that prehospital fibrinogen concentrate administration in traumatic bleeding patients is both feasible and effective, improving mortality and clotting parameters. While implementing a time-saving and proactive approach with fibrinogen holds potential for enhancing trauma care, the current evidence is limited. Further studies in this novel field are warranted.Keywords: fibrinogen concentrate, prehospital, military, trauma, trauma-induced coagulopathy
Procedia PDF Downloads 2317053 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 20417052 Connecting Critical Macro-Finance to Theories of Capitalism
Authors: Vithul Kalki
Abstract:
The mainstream political economy failed to explain the nature and causes of systemic failures and thus to compare and comprehend how contemporary capitalist systems work. An alternative research framework of Critical Macro-Finance (CMF) is an attempt to collaborate political theory with post-Keynesian economics with an objective to find answers to unresolved questions that emerged since the international financial crisis and repeated failures of capital systems. This unorthodox approach brings out four main propositions, namely : (a) that the adoption of American financial practices has anchored financial globalization in market-based finance; (b) that global finance is a set of interconnected, hierarchical balance sheets, increasingly subject to time-critical liquidity; (c) that credit creation in market-based finance involves new forms of money; and (d) that market-based finance structurally requires a de-risking state capable both of protecting systemic liabilities and creating new investment opportunities. The ongoing discussion of CMF literature is yet to be tested or even fully framed. This qualitative paper will critically examine the CMF framework and will engage in discussions aiming to connect the CMF with theories of capitalism in a wider context to bring a holistic approach for analyzing contemporary financial capitalism.Keywords: critical macro-finance, capitalism, financial system, comparative political economy
Procedia PDF Downloads 18517051 Effect of Internal Control Weaknesses and Audit Opinion to the Findings of State Losses
Authors: Wiji Wijaya
Abstract:
The aim of this research is to examine the effect of internal control weaknesses and audit opinion on the state’s loss findings of audit compliance to the regulation in public sector. The samples of this research consisted of 175 local government financial statements in the area of Central Java Province at 2009 until 2013. Area sampling design was used to select the financial statements. This study using quantitative descriptive statistical analysis and regression was run for data analysis and hypothesis examination. Result of this study indicated that internal control weaknesses and audit opinion contributes a positive influence which is significant to the state’s loss findings of audit compliance to the regulation. The internal control weaknesses that affect the state's loss finding are weakness control system of accounting and reporting with the value of the critical ratio 0.010 p 2.613 ; weakness budget execution control system with critical ratio value of 3.421 p 0.001 and weaknesses internal control structure with critical ratio value of 2.246 p 0.026 . While the audit opinion with a critical ratio value of 4.401 p 0.000. The implications of this research so that policy makers at the local government should give more attention to the implementation and improvement of internal control system.Keywords: audit compliance findings, state’s loss, audit opinion, internal control, local government
Procedia PDF Downloads 37917050 Infusion of Skills for Undergraduate Scholarship into Teacher Education: Two Case Studies in New York and Florida
Authors: Tunde Szecsi, Janka Szilagyi
Abstract:
Students majoring in education are underrepresented in undergraduate scholarship. To enable and encourage teacher candidates to engage in scholarly activities, it is essential to infuse skills such as problem-solving, critical thinking, oral and written communication, collaboration and the utilization of information literacy, into courses in teacher preparation programs. In this empirical study, we examined two teacher education programs – one in New York State and one in Florida – in terms of the approaches of the course-based infusion of skills for undergraduate research, and the effectiveness of this infusion. First, course-related documents such as syllabi, assignment descriptions, and course activities were reviewed and analyzed. The goal of the document analysis was to identify and describe the targeted skills, and the pedagogical approaches and strategies for promoting research skills in teacher candidates. Next, a selection of teacher candidates’ scholarly products from the institution in Florida was used as a data set to examine teacher candidates’ skill development in the context of the identified assignments. This dataset was analyzed both quantitatively and qualitatively to describe the changes that occurred in teacher candidates’ critical thinking, communication, and information literacy skills, and to uncover patterns in the skill development at the two institutions. Descriptive statistics were calculated to explore the changes in these skills of teacher candidates over a period of three years. The findings based on data from the teacher education program in Florida indicated a steady gain in written communication and critical thinking and a modest increase in informational literacy. At the institution in New York, candidates’ submission and success rates on the edTPA, a New York State Teacher Certification exam, was used as a measure of scholarly skills. Overall, although different approaches were used for infusing the development of scholarly skills in the courses, the results suggest that a holistic and well-orchestrated infusion of the skills into most courses in the teacher education program might result in steadily developing scholarly skills. These results offered essential implications for teacher education programs in terms of further improvements in teacher candidates’ skills for engaging in undergraduate research and scholarship. In this presentation, our purpose is to showcase two approaches developed by two teacher education programs to demonstrate how diverse approaches toward the promotion of undergraduate scholarship activities are responsive to the context of the teacher preparation programs.Keywords: critical thinking, pedagogical strategies, teacher education, undergraduate student research
Procedia PDF Downloads 16117049 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 517