Search results for: emotive triggers environmental security
8601 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 4888600 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 1348599 Cumulus Cells of Mature Local Goat Oocytes Vitrified with Insulin Transferrin Selenium and Heat Shock Protein 70
Authors: Izzatul Ulfana, Angga Pratomo Cahyadi, Rimayanti, Widjiati
Abstract:
Freezing oocyte could cause temperature stress. Temperature stress triggers cell damage. Insulin Transferrin Selenium (ITS) and Heat Shock Protein 70 (HSP70) had been used to prevent damage to the oocyte after freezing. ITS and HSP70 could cause the difference protective effect. The aim of this research was to obtain an effective cryoprotectant for freezing local goat oocyte in cumulus cells change. The research began by collecting the ovary from a local slaughterhouse in Indonesia, aspiration follicle, in vitro maturation and the freezing had been used vitrification method. Examination of the morphology cells by native staining method. Data on the calculation morphology oocyte analyzed by Kruskall-Wallis Test. After the Kruskall-Wallis Test which indicated significance, followed by Mann-Whitney Test to compare between treatment groups. As a result, cryoprotectant ITS has the best culumus cells after warmingKeywords: Insulin Transferrin Selenium, Heat Shock Protein 70, cryoprotectant, vitrification
Procedia PDF Downloads 2418598 Analysis of Environmental Impacts Generated in the Seasons of Holidays from Praia Dos Buritis in Palmas, Tocantins, Brazil
Authors: Alana C. M. Santana, Mary L. G. S. Senna
Abstract:
T Sustainable development is very important for the existence of life on the planet. The use of any space without planning can cause impacts on the environment, which depending on the proportion may be irreversible. Buritis beach is very frequented by visitors, but it has no information on use and does not have enough infrastructure to collaborate with the preservation of the environment. Therefore, the objective of this study was to adopt a simple control list of environmental impacts in river beaches, in order to identify the environmental impacts generated in the post-holiday seasons of Buritis beach and to characterize the beach in terms of infrastructure. The holidays that carried out the analyzes were the nationals of the second half of 2017, as well as the universal fraternization holiday of 2018. The results show that the beach needs investments in its infrastructure and educational campaigns to minimize environmental impacts caused by anthropic action.Keywords: environmental impacts, sustainable development, Buritis Beach, Brazil.
Procedia PDF Downloads 1638597 The Impact of Artificial Intelligence on Human Rights Development
Authors: Romany Wagih Farag Zaky
Abstract:
The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. The article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, which is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 638596 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 1868595 Solid Waste Pollution and the Importance of Environmental Planning in Managing and Preserving the Public Environment in Benghazi City and Its Surrounding Areas
Authors: Abdelsalam Omran Gebril
Abstract:
Pollution and solid waste are the most important environmental problems plaguing the city of Benghazi as well as other cities and towns in Libya. These problems are caused by the lack of environmental planning and sound environmental management. Environmental planning is very important at present for the development of projects that preserve the environment, therefore, the planning process should be prioritized over the management process. Pollution caused by poor planning and environmental management exists not only in Benghazi but also in all other Libyan cities. This study was conducted through various field visits to several neighborhoods and areas within Benghazi as well as its neighboring regions. Follow-ups in these areas were conducted from March 2013 to October 2013 and documented by photographs. The existing methods of waste collection and means of transportation were investigated. Interviews were conducted with relevant authorities, including the Environment Public Authority in Benghazi and the Public Service Company of Benghazi. The objective of this study is to determine the causes of solid waste pollution in Benghazi City and its surrounding areas. Results show that solid waste pollution in Benghazi and its surrounding areas is the result of poor planning and environmental management, population growth, and the lack of hardware and equipment for the collection and transport of waste from the city to the landfill site. One of the most important recommendations in this study is the development of a complete and comprehensive plan that includes environmental planning and environmental management to reduce solid waste pollution.Keywords: solid waste, pollution, environmental planning, management, Benghazi, Libya
Procedia PDF Downloads 3208594 Oil Exploitation, Environmental Injustice and Decolonial Nonrecognition: Exploring the Historical Accounts of Host Communities in South-Eastern Nigeria
Authors: Ejikeme Johnson Kanu
Abstract:
This research explores the environmental justice of host communities in south-eastern Nigeria whose source of livelihood has been destroyed due to oil exploitation. Environmental justice scholarship in the area often adopts Western liberal ideology from a more macro level synthesis (Niger Delta). This study therefore explored the sufficiency or otherwise of the adoption of Western liberal ideology in the framing of environmental justice (EJ) in the area which neglects the impact of colonialism and cultural domination. Mixed archival research supplemented by secondary analysis guided this study. Drawing from data analysis, the paper first argues that micro-level studies are required to either validate or invalidate the studies done at the macro-level (Niger Delta) which has often been used to generalise around environmental injustice done within the host communities even though the communities (South-eastern) differ significantly from (South-south) in terms of language, culture, socio-political and economic formation which indicate that the drivers of EJ may differ among them. Secondly, the paper argues that EJ framing from the Western worldview adopted in the study area is insufficient to understand environmental injustice suffered in the study area and there is the need for environmental justice framing that will consider the impact of colonialism and nonrecognition of the cultural identities of the host communities which breed environmental justice. The study, therefore, concludes by drawing from decolonial theory to consider how the framing of EJ would move beyond the western liberal EJ to Indigenous environmental justice.Keywords: environmental justice, culture, decolonial, nonrecognition, indigenous environmental justice
Procedia PDF Downloads 1438593 Exploring the Effect of Environmental Cues of Food Festival on Visitor Satisfaction
Authors: Tao Zhang
Abstract:
As the competition of all kinds of festival events becomes more and more fierce, more and more event organizers try to design a blended festivalscape by integrating multifaceted environmental cues in order to raise the service quality of festival events and then raise visitors’ satisfaction. As the main type of festival events, food festivals are popular in all over the world. The organizers’ of food festivals also try to mix food with multifaceted environmental cues (e.g., music, stage, light, dance) to design a blended festivalscape. However, until now little studies explore the environmental cues of food festivals and their relationship with visitors’ satisfaction. Therefore, the aim of this study is to ascertain the environmental cues of food festival and their relationship with visitors’ satisfaction by using the blended festivalscape theory. Using convenient sampling method, this study investigated 1,000 food festival visitors in Macau. Factor analysis showed there are mainly six environmental cues (i.e., food, atmosphere, program, staff, facility, and information). All six environmental cues are positively related with visitors’ satisfaction, while the most influential factors are food, atmosphere, and program. This study showed that festival event organizers’ should focus on the topic of their festival event, build festival atmosphere, and create interesting programs in order to design a blended festivalscape and then raise visitors’ satisfaction.Keywords: environmental cue, event, festival, satisfaction
Procedia PDF Downloads 3688592 Assessment of Environmental Impacts and Determination of Sustainability Level of BOOG Granite Mine Using a Mathematical Model
Authors: Gholamhassan Kakha, Mohsen Jami, Daniel Alex Merino Natorce
Abstract:
Sustainable development refers to the creation of a balance between the development and the environment too; it consists of three key principles namely environment, society and economy. These three parameters are related to each other and the imbalance occurs in each will lead to the disparity of the other parts. Mining is one of the most important tools of the economic growth and social welfare in many countries. Meanwhile, assessment of the environmental impacts has directed to the attention of planners toward the natural environment of the areas surrounded by mines and allowing for monitoring and controlling of the current situation by the designers. In this look upon, a semi-quantitative model using a matrix method is presented for assessing the environmental impacts in the BOOG Granite Mine located in Sistan and Balouchestan, one of the provinces of Iran for determining the effective factors and environmental components. For accomplishing this purpose, the initial data are collected by the experts at the next stage; the effect of the factors affects each environmental component is determined by specifying the qualitative viewpoints. Based on the results, factors including air quality, ecology, human health and safety along with the environmental damages resulted from mining activities in that area. Finally, the results gained from the assessment of the environmental impact are used to evaluate the sustainability by using Philips mathematical model. The results show that the sustainability of this area is weak, so environmental preventive measures are recommended to reduce the environmental damages to its components.Keywords: sustainable development, environmental impacts' assessment, BOOG granite, Philips mathematical model
Procedia PDF Downloads 2038591 Environmental Decision Making Model for Assessing On-Site Performances of Building Subcontractors
Authors: Buket Metin
Abstract:
Buildings cause a variety of loads on the environment due to activities performed at each stage of the building life cycle. Construction is the first stage that affects both the natural and built environments at different steps of the process, which can be defined as transportation of materials within the construction site, formation and preparation of materials on-site and the application of materials to realize the building subsystems. All of these steps require the use of technology, which varies based on the facilities that contractors and subcontractors have. Hence, environmental consequences of the construction process should be tackled by focusing on construction technology options used in every step of the process. This paper presents an environmental decision-making model for assessing on-site performances of subcontractors based on the construction technology options which they can supply. First, construction technologies, which constitute information, tools and methods, are classified. Then, environmental performance criteria are set forth related to resource consumption, ecosystem quality, and human health issues. Finally, the model is developed based on the relationships between the construction technology components and the environmental performance criteria. The Fuzzy Analytical Hierarchy Process (FAHP) method is used for weighting the environmental performance criteria according to environmental priorities of decision-maker(s), while the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method is used for ranking on-site environmental performances of subcontractors using quantitative data related to the construction technology components. Thus, the model aims to provide an insight to decision-maker(s) about the environmental consequences of the construction process and to provide an opportunity to improve the overall environmental performance of construction sites.Keywords: construction process, construction technology, decision making, environmental performance, subcontractor
Procedia PDF Downloads 2528590 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 2948589 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing
Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi
Abstract:
This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning
Procedia PDF Downloads 418588 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 3588587 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.
Procedia PDF Downloads 398586 Aspects of Environmental Sustainability in the Operation of Onshore Hydrocarbon Pipelines
Authors: Emil Aliyev
Abstract:
The main focus of this conference paper is on the aspects of the environmental sustainability of onshore hydrocarbon pipelines. The latter is notorious for being a source of major environmental contamination and a consumer of vast amounts of natural resources such as water, land, steel, etc. Therefore, the environmentally sustainable operation of pipelines is a concern that requires attention and research. The geographical scope of the paper is confined to onshore hydrocarbon pipelines operated in the Middle East region. The research contains elements of originality as it draws on the author’s field experience and practical implementation of environmental and sustainability solutions in a major Middle East-based pipeline organization. The authors describe some of the most common significant environmental aspects of pipeline operations and provide examples of various approaches and technologies that can be successfully utilized to make pipelines more environmentally sustainable. The author concludes that the operation of onshore hydrocarbon pipelines can be made environmentally sustainable. This can be achieved by adopting a systematic framework, focusing limited resources on significant aspects, integrating a circular economy into day-to-day activities, and having strong management support.Keywords: pipelines, onshore hydrocarbon pipelines, environmental sustainability, significant environmental aspects
Procedia PDF Downloads 1018585 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use
Authors: Mayank Mundhra, Chester Rebeiro
Abstract:
Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.Keywords: Ripple, Kelips, unique node list, consensus, information propagation
Procedia PDF Downloads 1548584 Quantum Inspired Security on a Mobile Phone
Authors: Yu Qin, Wanjiaman Li
Abstract:
The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.Keywords: one-time pad, QKD (quantum key distribution), QR code, application
Procedia PDF Downloads 1498583 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 2668582 The Impact of Technology on Cultural Heritage among Preschool Children
Authors: Adenike Akinrotimi
Abstract:
Globally, education has been identified as vital tool for any form of development for any society (community); be it economic, social, political and cultural development. It is the determinant level of prosperity, welfare, security and sustenance of the people of a particular community. Education could be formal, informal and non-formal. Cultural development of an individual and of the community as it were is a lifelong process, where individual learns from daily experiences, exposure to the environment at home, at work, at play and it enriches human and environmental potentials. This type of education can be referred to as cultural heritage. It is built on learner participation and assimilation. Preschool programme also referred to as Early Childhood Education is critical to holistic development of a child cultural development inclusive. This paper examines the impact that technology has on cultural heritage among preschool children.Keywords: cultural heritage, education, pre-school, technology
Procedia PDF Downloads 4028581 The Balancing Act: India and Maldives in the Quest for Regional Prosperity
Authors: Arya S. S.
Abstract:
India is one of the powerful country in the world .India and Maldives having common interests in regional security and economic growth, this relationship has seen substantial change in recent years. This paper examines the complex dynamics of this bilateral relationship, emphasizing the careful balancing act that both countries perform in order to advance regional prosperity. It looks at historical connections, geopolitical factors, and current issues like economic cooperation, climate change, and marine security. The study highlights how India's involvement in the Maldives contributes to both bilateral ties and regional stability by examining important initiatives including trade agreements and infrastructure projects. It also discusses the effects of outside factors and the necessity for both nations to strategically manage their interests. In order to contribute to a more affluent and stable Indian Ocean area, this study ultimately seeks to shed light on how India and the Maldives may cooperate to promote sustainable development while tackling security issues. The India Maldives relation is very crucial in the regional stability of Indian ocean region. The initiatives like building infrastructure, giving financial support, and establishing the India-Maldives Friendship Bridge demonstrate India's dedication to Maldivian prosperity. In addition to boosting the Maldives' economy, these investments strengthen India's clout in the area, which is essential for preserving its maritime security interests in the face of growing Chinese dominance. Both India and China involved in a strategic tug of war in order to enhance their dominance in Maldives. There are difficulties with this collaboration including, political unrest in the Maldives has occasionally resulted in changes to foreign policy, particularly under regimes that support stronger ties with China. India has expressed concern about losing strategic footholds in the Indian Ocean as a result of China's extension of influence through debt diplomacy and infrastructure projects. India must therefore strike a balance between advancing its objectives and upholding Maldivian sovereignty as well as the goals of its people and government. In summary, the partnership between India and the Maldives is a complex balancing act that is marked by cultural links, security cooperation, and economic dependency. Both countries must negotiate the complexity of international relations as they work for regional prosperity, especially in light of both internal and external factors. India and the Maldives can strengthen their positions as key actors in the changing dynamics of the Indian Ocean by promoting cooperation and communication. This would not only protect their particular interests but also help create a stable and prosperous South Asian region.Keywords: regional security, balancing act, debt trap diplomacy, strategic tug of war
Procedia PDF Downloads 248580 Smart Water Cities for a Sustainable Future: Defining, Necessity, and Policy Pathways for Canada's Urban Water Resilience
Authors: Sima Saadi, Carolyn Johns
Abstract:
The concept of a "Smart Water City" is emerging as a framework to address critical urban water challenges, integrating technology, data, and sustainable management practices to enhance water quality, conservation, and accessibility. This paper explores the definition of a Smart Water City, examines the pressing need for such cities in Canada, and proposes policy pathways for their development. Smart Water Cities utilize advanced monitoring systems, data analytics, and integrated water resources management to optimize water usage, anticipate and mitigate environmental impacts, and engage citizens in sustainable practices. Global examples from regions such as Europe, Asia, and Australia illustrate how Smart Water City models can transform urban water systems by enhancing resilience, improving resource efficiency, and driving economic development through job creation in environmental technology sectors. For Canada, adopting Smart Water City principles could address pressing challenges, including climate-induced water stress, aging infrastructure, and the need for equitable water access across diverse urban and rural communities. Building on Canada's existing water policies and technological expertise, it propose strategic investments in digital water infrastructure, data-driven governance, and community partnerships. Through case studies, this paper offers insights into how Canadian cities could benefit from cross-sector collaboration, policy development, and funding for smart water technology. By aligning national policy with smart urban water solutions, Canada has the potential to lead globally in sustainable water management, ensuring long-term water security and environmental stewardship for its cities and communities.Keywords: smart water city, urban water resilience, water management technology, sustainable water infrastructure, canada water policy, smart city initiatives
Procedia PDF Downloads 188579 When Women Take the Lead: Exploring the Intersection Between Gender Equality and Women’s Environmental Political Engagement from a Comparative Perspective
Authors: Summer Isaacson
Abstract:
Research on gender differences in environmental behavior has long claimed that women engage less than men in environmental political participation (EPP) (protests, petitions), despite their higher levels of environmental concern and vulnerability. Using recent data from the ISSP’s 2020 Environment module including 28 countries, we revisit the gender gap in EPP. Arguing that increasing gender equality and socio-economic development can allow women to voice their environmental grievances, we use multi-level models to examine the effects of macro-level gender equality on gender differences in environmental protests, petitions, and boycotts. By distinguishing individual from collective and non-confrontational from confrontational engagement forms, this study offers an encompassing understanding of gendered patterns of participation. Women do participate more than men, but mainly in individual and non-confrontational EPP forms (petitions, boycotts) and with substantial variation across countries. Moreover, considering how women have historically been restrained from participating in politics, we argue that structural gender inequality remains an important limitation to women’s engagement. Cross-level interactions indicate that in more egalitarian countries, women are more likely to engage in several types of EPP than men. The study offers new perspectives and findings on gender differences in EPP, highlighting the impact of gender inequality on women’s participation.Keywords: environmental activism, political participation, gender equality, pro-environmental behavior
Procedia PDF Downloads 688578 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach
Authors: Bilal Zubair
Abstract:
In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.Keywords: counter-terrorism, terrorism, sectarianism, securitizing
Procedia PDF Downloads 3018577 Environmental Accounting: A Conceptual Study of Indian Context
Authors: Pradip Kumar Das
Abstract:
As the entire world continues its rapid move towards industrialization, it has seriously threatened mankind’s ability to maintain an ecological balance. Geographical and natural forces have a significant influence on the location of industries. Industrialization is the foundation stone of the development of any country, while the unplanned industrialization and discharge of waste by industries is the cause of environmental pollution. There is growing degree of awareness and concern globally among nations about environmental degradation or pollution. Environmental resources endowed by the gift of nature and not manmade are invaluable natural resources of a country like India. Any developmental activity is directly related to natural and environmental resources. Economic development without environmental considerations brings about environmental crises and damages the quality of life of present, as well as future generation. As corporate sectors in the global market, especially in India, are becoming anxious about environmental degradation, naturally more and more emphasis will be ascribed to how environment-friendly the outcomes are. Maintaining accounts of such environmental and natural resources in the country has become more urgent. Moreover, international awareness and acceptance of the importance of environmental issues has motivated the development of a branch of accounting called “Environmental Accounting”. Environmental accounting attempts to detect and focus the resources consumed and the costs rendered by an industrial unit to the environment. For the sustainable development of mankind, a healthy environment is indispensable. Gradually, therefore, in many countries including India, environment matters are being given top most priority. Accounting and disclosure of environmental matters have been increasingly manifesting as an important dimension of corporate accounting and reporting practices. But, as conventional accounting deals with mainly non-living things, the formulation of valuation, and measurement and accounting techniques for incorporating environment-related matters in the corporate financial statement sometimes creates problems for the accountant. In the light of this situation, the conceptual analysis of the study is concerned with the rationale of environmental accounting on the economy and society as a whole, and focuses the failures of the traditional accounting system. A modest attempt has been made to throw light on the environmental awareness in developing nations like India and discuss the problems associated with the implementation of environmental accounting. The conceptual study also reflects that despite different anomalies, environmental accounting is becoming an increasing important aspect of the accounting agenda within the corporate sector in India. Lastly, a conclusion, along with recommendations, has been given to overcome the situation.Keywords: environmental accounting, environmental degradation, environmental management, environmental resources
Procedia PDF Downloads 3468576 Study of the Environment Problems of Flowers in the World
Authors: Esmaeil Khodadad
Abstract:
The environment is one of the hotbeds of global politics. It is only necessary to emphasize the human being on this word, and to take it as a serious political-social debate, so as to prevent the collapse of the harmony of the system of nature governing the earth, the landlord and its creatures. Earth, water and humans are three interconnected arms that should be kept in balance and harmony. The collapse of one of these arms disrupts the entire framework of the philosophy of life on earth. Environmental issues were found worldwide in the late 20th century and were given serious attention by experts. At the same time, international environmental issues have brought to the forefront the challenges of international relations. These ideas have introduced environmental issues and some of the main features of the causes and consequences of global environmental change, as well as ways to deal with this change Has been discussed. The objectives of this study are environmental issues in the world and in Iran, and it shows what factors contribute to the formation of spatial systems and its supporting systems, and finally what the goals should be about the ideal state of the future of the global environment and its issues. The information required for this research is a combination of documentary, descriptive-analytical and library methods.Keywords: environment, environmental issues, flower, oeacen
Procedia PDF Downloads 1448575 Occupational Safety Need Analysis for Turkey and Europe
Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci
Abstract:
This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.Keywords: Europe, need analysis, occupational safety, Turkey, vocational education
Procedia PDF Downloads 4348574 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia
Authors: Rachel Thomas Tharmabalan
Abstract:
The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems
Procedia PDF Downloads 1618573 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 1308572 An Overview of Electronic Waste as Aggregate in Concrete
Authors: S. R. Shamili, C. Natarajan, J. Karthikeyan
Abstract:
Rapid growth of world population and widespread urbanization has remarkably increased the development of the construction industry which caused a huge demand for sand and gravels. Environmental problems occur when the rate of extraction of sand, gravels, and other materials exceeds the rate of generation of natural resources; therefore, an alternative source is essential to replace the materials used in concrete. Now-a-days, electronic products have become an integral part of daily life which provides more comfort, security, and ease of exchange of information. These electronic waste (E-Waste) materials have serious human health concerns and require extreme care in its disposal to avoid any adverse impacts. Disposal or dumping of these E-Wastes also causes major issues because it is highly complex to handle and often contains highly toxic chemicals such as lead, cadmium, mercury, beryllium, brominates flame retardants (BFRs), polyvinyl chloride (PVC), and phosphorus compounds. Hence, E-Waste can be incorporated in concrete to make a sustainable environment. This paper deals with the composition, preparation, properties, classification of E-Waste. All these processes avoid dumping to landfills whilst conserving natural aggregate resources, and providing a better environmental option. This paper also provides a detailed literature review on the behaviour of concrete with incorporation of E-Wastes. Many research shows the strong possibility of using E-Waste as a substitute of aggregates eventually it reduces the use of natural aggregates in concrete.Keywords: dumping, electronic waste, landfill, toxic chemicals
Procedia PDF Downloads 173