Search results for: national security strategy
9174 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 1849173 Mastering Digitization: A Quality-Adapted Digital Transformation Model
Authors: Franziska Schaefer, Marlene Kuhn, Heiner Otten
Abstract:
In the very near future, digitization will be the main challenge a company has to master to survive in a highly competitive market. Developing the right transformation strategy by considering all relevant aspects determines the success or failure of a company. Especially the digital focus on the customer plays a key role in creating sustainable competitive advantages, also leading to new tasks within the quality management. Therefore, quality management needs to be particularly addressed to support the upcoming digital change. In this paper, we present an analysis of existing digital transformation approaches and derive a transformation strategy from a quality management perspective. We identify and classify different transformation dimensions and assess their relevance to quality management tasks, resulting in a quality-adapted digital transformation model. Furthermore, we introduce applicable and customized quality management methods to support the presented digital transformation tasks. With our developed model we provide a digital transformation guideline from a quality perspective to master future disruptive changes.Keywords: digital transformation, digitization, quality management, strategy
Procedia PDF Downloads 4809172 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network
Authors: Mohsen Dourandish
Abstract:
Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage
Procedia PDF Downloads 3259171 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis
Authors: Mai Alshareef
Abstract:
The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.Keywords: education, cyberconflict, Twitter, national identity
Procedia PDF Downloads 1749170 Evidence on Scale Economies in National Bank of Pakistan
Authors: Sohail Zafar, Sardar Javaid Iqbal Khan
Abstract:
We use a parametric approach within a translog cost function framework to estimate the economies of scale in National Bank of Pakistan from 1997 to 2013. The results indicate significant economies of scale throughout the sample at aggregates and disaggregates taking in account size subject to stipulation ownership. The factor markets often produce scale inefficiencies in the banking of developing countries like Pakistan such inefficiencies are common due to distortion in factor markets leading to the use of inappropriate factor proportions. The findings suggest that National Bank of Pakistan diversify their asset portfolios that it has cost advantage, therefore, expansion in size should be encouraged under current technology because it appears to be cost effective. In addition, our findings support the implementation of universal banking model in Pakistan.Keywords: scale economies, cost function, disaggregates, aggregates
Procedia PDF Downloads 3269169 Use of Galileo Advanced Features in Maritime Domain
Authors: Olivier Chaigneau, Damianos Oikonomidis, Marie-Cecile Delmas
Abstract:
GAMBAS (Galileo Advanced features for the Maritime domain: Breakthrough Applications for Safety and security) is a project funded by the European Space Program Agency (EUSPA) aiming at identifying the search-and-rescue and ship security alert system needs for maritime users (including operators and fishing stakeholders) and developing operational concepts to answer these needs. The general objective of the GAMBAS project is to support the deployment of Galileo exclusive features in the maritime domain in order to improve safety and security at sea, detection of illegal activities and associated surveillance means, resilience to natural and human-induced emergency situations, and develop, integrate, demonstrate, standardize and disseminate these new associated capabilities. The project aims to demonstrate: improvement of the SAR (Search And Rescue) and SSAS (Ship Security Alert System) detection and response to maritime distress through the integration of new features into the beacon for SSAS in terms of cost optimization, user-friendly aspects, integration of Galileo and OS NMA (Open Service Navigation Message Authentication) reception for improved authenticated localization performance and reliability, and at sea triggering capabilities, optimization of the responsiveness of RCCs (Rescue Co-ordination Centre) towards the distress situations affecting vessels, the adaptation of the MCCs (Mission Control Center) and MEOLUT (Medium Earth Orbit Local User Terminal) to the data distribution of SSAS alerts.Keywords: Galileo new advanced features, maritime, safety, security
Procedia PDF Downloads 939168 Singular Stochastic Control Model with Carrying Capacity of Population Management Policy for Squirrels in Durian Orchards
Authors: Sasiwimol Auepong, Raywat Tanadkithirun
Abstract:
In this work, the problem that squirrels ruin durian, which is an economical fruit in Thailand, is considered. We seek the strategy for the durian farmers to eliminate the squirrels under the consideration that squirrels also provide ecosystem service. The population dynamics of squirrels are constructed to have carrying capacity since we consider the population in a confined area. A performance index indicating the total benefit of a given elimination strategy is provided. It comprises the cost of countermeasures, the loss of resources, and the ecosystem service provided by squirrels. The optimal performance index is numerically solved through the variational inequality using the finite difference method. The optimal strategy to control the squirrel population is also given numerically.Keywords: controlled stochastic differential equation, durian, finite difference method, performance index, singular stochastic control model, squirrel
Procedia PDF Downloads 919167 The Renewed Constitutional Roots of Agricultural Law in Hungary in Line with Sustainability
Authors: Gergely Horvath
Abstract:
The study analyzes the special provisions of the highest level of national agricultural legislation in the Fundamental Law of Hungary (25 April 2011) with descriptive, analytic and comparative methods. The agriculturally relevant articles of the constitution are very important, because –in spite of their high level of abstraction– they can determine and serve the practice comprehensively and effectively. That is why the objective of the research is to interpret the concrete sentences and phrases in connection with agriculture compared with the methods of some other relevant constitutions (historical-grammatical interpretation). The major findings of the study focus on searching for the appropriate provisions and approach capable of solving the problems of sustainable food production. The real challenge agricultural law must face with in the future is protecting or conserving its background and subjects: the environment, the ecosystem services and all the 'roots' of food production. In effect, agricultural law is the legal aspect of the production of 'our daily bread' from farm to table. However, it also must guarantee the safe daily food for our children and for all our descendants. In connection with sustainability, this unique, value-oriented constitution of an agrarian country even deals with uncustomary questions in this level of legislation like GMOs (by banning the production of genetically modified crops). The starting point is that the principle of public good (principium boni communis) must be the leading notion of the norm, which is an idea partly outside the law. The public interest is reflected by the agricultural law mainly in the concept of public health (in connection with food security) and the security of supply with healthy food. The construed Article P claims the general protection of our natural resources as a requirement. The enumeration of the specific natural resources 'which all form part of the common national heritage' also means the conservation of the grounds of sustainable agriculture. The reference of the arable land represents the subfield of law of the protection of land (and soil conservation), that of the water resources represents the subfield of water protection, the reference of forests and the biological diversity visualize the specialty of nature conservation, which is an essential support for agrobiodiversity. The mentioned protected objects constituting the nation's common heritage metonymically melt with their protective regimes, strengthening them and forming constitutional references of law. This regimes also mean the protection of the natural foundations of the life of the living and also the future generations, in the name of intra- and intergenerational equity.Keywords: agricultural law, constitutional values, natural resources, sustainability
Procedia PDF Downloads 1669166 The Role of Sustainable Financing Models for Smallholder Tree Growers in Ghana
Authors: Raymond Awinbilla
Abstract:
The call for tree planting has long been set in motion by the government of Ghana. The Forestry Commission encourages plantation development through numerous interventions including formulating policies and enacting legislations. However, forest policies have failed and that has generated a major concern over the vast gap between the intentions of national policies and the realities established. This study addresses three objectives;1) Assessing the farmers' response and contribution to the tree planting initiative, 2) Identifying socio-economic factors hindering the development of smallholder plantations as a livelihood strategy, and 3) Determining the level of support available for smallholder tree growers and the factors influencing it. The field work was done in 12 farming communities in Ghana. The article illuminates that farmers have responded to the call for tree planting and have planted both exotic and indigenous tree species. Farmers have converted 17.2% (369.48ha) of their total land size into plantations and have no problem with land tenure. Operations and marketing constraints include lack of funds for operations, delay in payment, low price of wood, manipulation of price by buyers, documentation by buyers, and no ready market for harvesting wood products. Environmental institutions encourage tree planting; the only exception is with the Lands Commission. Support availed to farmers includes capacity building in silvicultural practices, organisation of farmers, linkage to markets and finance. Efforts by the Government of Ghana to enhance forest resources in the country could rely on the input of local populations.Keywords: livelihood strategy, marketing constraints, environmental institutions, silvicultural practices
Procedia PDF Downloads 589165 The Effects of Implementing Platform Strategy for Craft Industry Development: A Case Study on Economic Value-Added of Taiwan Bamboo Village
Authors: Kuo-Wei Hsu, Shu-Fang Huang
Abstract:
Global trend in creative economies promoted the modernization process of the development of cultural and creative industries and technology coincided with the craft industry towards value-added industrial restructuring. Due to government support and economic motivation in the private sector, regional craft products have emerged across counties and cities all over Taiwan which have led to an increased focus on craft culture promotion. However, most craft industry corporations in Taiwan are micro-enterprise, restricted operating profitability. This phenomenon shows the weakness of craft industry constitution when facing the rapid expansion of global economic commerce and manufacturing. In recent years, combining public and private enterprise, Platform business models revolutionary changed in craft industries’ original operation and transaction models. Therefore, this study attempts to explore the effects by implementing platform strategy on bamboo industry development in Nantou, the hometown of crafts in Taiwan, with an experimental investigation. This study concluded that platform strategy increases essence and insubstantial value for the bamboo industry in Taiwan. This study explored the economic value added of Taiwan bamboo village with three perspectives: Community participation, Culture Conservation, Regional Rejuvenation.Keywords: platform strategy, craft industry, economic value-added
Procedia PDF Downloads 3419164 Determinants and Repercussions of International Migration in and Through Libya: Afield Study
Authors: Ihab S. Jweida
Abstract:
Libya is witnessing major shifts in international migration flows resulting frompolitical, economic, social, security and environmental reasons as a result of what it iswitnessing from the elements of a fragile state due to government division, politicalconflicts, security chaos and the spread of terrorist organizations, since the popularuprising in February 2011, which threatens economic, social and security stability andthen The political stability of the Mediterranean basin countries. Therefore, this studycame as a scientific research aimed at analyzing the role of political economy inexplaining international migration with application to the case of Libya during theperiod from 2011-2021. To achieve this objective, the researcher relied on the descriptive approach basedon qualitative and quantitative analysis to analyze studies, reports, and internationalmigration policies in Libya, and conducted an exploratory study based on a personalinterview questionnaire for (670) migrants present in the distribution areas in Libyaand (65) Libyan migrants,Keywords: international, migration, Libya, case
Procedia PDF Downloads 629163 Understanding the Historical Consciousness of Children and Young People
Authors: Kay Carroll
Abstract:
Creating historical consciousness in children and young people is critical to global inclusion and engagement. In a context of international and technological flux, children are confronted with shifting national identities. Within this quantitative study of Australian children and young people, the concept and development of historical consciousness are explored. The analysis reports on how children and young people are connected through national, collective, and personal narratives to understand historically significant events and changes, anchor themselves to universal and intergenerational traditions and norms, be open to divergent perspectives and resilient to perpetual socio-cultural shifts. This paper presents the development and factors that shape national historical consciousness in children and young people using established international frameworks and stages of historical consciousness. This research reports on quantitative surveys conducted with over 680 school children from ages 12 years to 19 years within Australian schools. Concepts of global citizenship, inclusion, and engagement with national historical memory and significance are explored. Findings identify the social benefits of collective and personal historical consciousness and consider the current barriers and enablers in developing a young person’s historical consciousness for the future.Keywords: curriculum, global citizenship, historical consciousness, significance
Procedia PDF Downloads 1979162 The Role of Digital Media in the Change of Saudi Nationalism: A Systematic Review and Meta-Analysis
Authors: Alaa Alshaikh
Abstract:
While digital technologies were initially seen as harbingers of globalisation and cosmopolitanism, scholars increasingly acknowledge their role in the rise of nationalism. This paper studies the national identity in light of the digital media in Saudi Arabia. It offers an extensive meta-analysis of the evolution of the national identity on social media. It examines the national identity and its components and deals with the difference between it and digital nationalism, which is formed and affected by the country's fulfillment of the citizen's needs. Hereto a systematic examination of all 40 articles published between October 2016 and December 2022 was conducted. Findings indicate that three characteristics of contemporary nationalism are partly linked to recent shifts in digital communication: diversification, fragmentation, and commodification. The paper concludes by considering the implications of our arguments for future research in the field.Keywords: meta analysis, Saudi Arabia, nationalism, social media
Procedia PDF Downloads 1319161 Distributed Control Strategy for Dispersed Energy Storage Units in the DC Microgrid Based on Discrete Consensus
Authors: Hanqing Yang, Xiang Meng, Qi Li, Weirong Chen
Abstract:
The SOC (state of charge) based droop control has limitations on the load power sharing among different energy storage units, due to the line impedance. In this paper, a distributed control strategy for dispersed energy storage units in the DC microgrid based on discrete consensus is proposed. Firstly, a sparse information communication network is built. Thus, local controllers can communicate with its neighbors using voltage, current and SOC information. An average voltage of grid can be evaluated to compensate voltage offset by droop control, and an objective virtual resistance fulfilling above requirement can be dynamically calculated to distribute load power according to the SOC of the energy storage units. Then, the stability of the whole system and influence of communication delay are analyzed. It can be concluded that this control strategy can improve the robustness and flexibility, because of having no center controller. Finally, a model of DC microgrid with dispersed energy storage units and loads is built, the discrete distributed algorithm is established and communication protocol is developed. The co-simulation between Matlab/Simulink and JADE (Java agent development framework) has verified the effectiveness of proposed control strategy.Keywords: dispersed energy storage units, discrete consensus algorithm, state of charge, communication delay
Procedia PDF Downloads 2809160 Effect of Cooperative Learning Strategy on Mathematics Achievement and Retention of Senior Secondary School Students of Different Ability Levels in Taraba State, Nigeria
Authors: Onesimus Bulus Shiaki
Abstract:
The study investigated the effect of cooperative learning strategy on mathematics achievement and retention among senior secondary school students of different abilities in Taraba State Nigeria. Cooperative learning strategy could hopefully contribute to students’ achievement which will spur the teachers to develop strategies for better learning. The quasi-experimental of pretest, posttest and control group design was adopted in this study. A sample of one hundred and sixty-four (164) Senior Secondary Two (SS2) students were selected from a population of twelve thousand, eight hundred and seventy-three (12,873) SS2 Students in Taraba State. Two schools with equivalent mean scores in the pre-test were randomly assigned to experimental and control groups. The experimental group students were stratified according to ability levels of low, medium and high. The experimental group was guided by the research assistants using the cooperative learning instructional package. After six weeks post-test was administered to the two groups while the retention test was administered two weeks after the post-test. The researcher developed a 50-item Mathematics Achievement Test (MAT) which was validated by experts obtaining the reliability coefficient of 0.87. Mean scores and standard deviations were used to answer the research questions while the Analysis of Co-variance (ANCOVA) was used to test the hypotheses. Major findings from the statistical analysis showed that cooperative learning strategy has a significant effect on the mean achievement of students as well as retention among students of high, medium and low ability in mathematics. However, cooperative learning strategy has no effect on the interaction of ability level and retention. Based on the results obtained, it was therefore recommended that the adoption of the use of cooperative learning strategy in the teaching and learning of mathematics in senior secondary schools be initiated, maintained and sustained for the benefit of senior secondary school students in Taraba State. Periodic Government sponsored in-service training in form of long vacation training programme, workshops, conferences and seminars on the nature, scope, and use of cooperative learning strategy should be organized for senior secondary school mathematics teachers in Taraba state.Keywords: ability level, cooperative learning, mathematics achievement, retention
Procedia PDF Downloads 1619159 Security of Database Using Chaotic Systems
Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem
Abstract:
Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST
Procedia PDF Downloads 2659158 Assessing India’s Foreign Policy Towards Afghanistan
Authors: Saifurahman Fayiz
Abstract:
Afghanistan and India have close technical, political, economic, and diplomatic bilateral ties. The ties is not limited between the governments of the two countries, but their relationship are among the peoples. India is the best regional trustworthy partner and biggest donor for the development of Afghanistan. The objectives of this study to assess India’s foreign policy towards Afghanistan since 9\11. The research method conducted based on qualitative research method with descriptive. The research findings propose that; India should deal with and build up its strategy relations with neighbor countries.Keywords: strategy, policy, India, Afghanistan
Procedia PDF Downloads 3279157 Effect of Marketing Strategy on the Performance of Small and Medium Enterprises in Nigeria
Authors: Kadiri Kayode Ibrahim, Kadiri Omowunmi
Abstract:
The research study was concerned with an evaluation of the effect of marketing strategy on the performance of SMEs in Abuja. This was achieved, specifically, through the examination of the effect of disaggregated components of Marketing Strategy (Product, Price, Promotion, Placement and Process) on Sales Volume (as a proxy for performance). The study design was causal in nature, with the use of quantitative methods involving a cross-sectional survey carried out with the administration of a structured questionnaire. A multistage sample of 398 respondents was utilized to provide the primary data used in the study. Subsequently, path analysis was employed in processing the obtained data and testing formulated hypotheses. Findings from the study indicated that all modeled components of marketing strategy were positive and statistically significant determinants of performance among businesses in the zone. It was, therefore, recommended that SMEs invest in continuous product innovation and development that are in line with the needs and preferences of the target market, as well as adopt a dynamic pricing strategy that considers both cost factors and market conditions. It is, therefore, crucial that businesses in the zone adopt marker communication measures that would stimulate brand awareness and increase engagement, including the use of social media platforms and content marketing. Additionally, owner-managers should ensure that their products are readily available to their target customers through an emphasis on availability and accessibility measures. Furthermore, a commitment to consistent optimization of internal operations is crucial for improved productivity, reduced costs, and enhanced customer satisfaction, which in turn will positively impact their overall performance.Keywords: product, price, promotion, placement
Procedia PDF Downloads 439156 Using 'Know, Want to Know, Learned' Strategy to Enhance the Seventh C Grade Students' Reading Comprehension Achievement at SMPN 1 Mumbulsari
Authors: Abdul Rofiq Badril Rizal M. Z.
Abstract:
Reading becomes one of the most important skills in teaching and learning English. The purpose of this research was to improve the students' active participation, and reading comprehension achievement by using Know, Want to Know, Learned (KWL) strategy. The research design was Classroom Action Research. The area and participants of this research were chosen by using purposive method. The data were collected by observation, a reading comprehension test, interview, and documentation. The results showed that there was significant improvement in Cycle 1 to Cycle 2 of the research. In cycle 1, the students’ active participation increased 49.77% from 28% to 77.77. In addition, in cycle 2, the students’ active participation also increased by 14.17% from 77.77% to 81.94%. The students’ reading comprehension achievement also increased by 52.14% from 25% to 77.14% in Cycle 1 and increased by 5.71% from 77.14% to 82.85% in cycle 2. It indicated that using Know, Want to Know, Learned (KWL) strategy could enhance the Seventh C grade students’ descriptive text reading comprehension achievement, and active participation.Keywords: active participation, reading comprehension, classroom action research, Indonesian folktales
Procedia PDF Downloads 1339155 Transnationalization Strategies of Danish Cinema: Susanne Bier, Lone Scherfig
Authors: Ebru Thwaites Diken
Abstract:
This article analyzes the works of certain directors in Danish cinema, namely Susanne Bier and Lone Sherfig, in the context of transnationalisation of Danish cinema. It looks at how the films' narratives negotiate and reconstruct the local / national / regional and the global. Scholars such as Nestingen & Elkington (2005), Hjort (2010), Higbee and Lim (2010), Bondebjerg and Redvall (2011) address transnationalism of Danish cinema in terms of production and distribution processes and how film making trascends national boundaries. This paper employs a particular understanding of transnationalism - in terms of how ideas and characters travel - to analyze how the storytelling and style has evolved to connect the national, the regional and the global on the basis of the works of these two directors. Strategies such as Hollywoodization - i.e. focus on stardom and classical narration, adhering to conventional European genre formulas, producing Danish films in English language have been identifiable strategies in Danish cinema in the period after the 2000s. Susanne Bier and Lone Scherfig are significant for employing some of these strategies simultaneously. For this reason, this article will look at how these two directors have employed these strategies and negotiated the cultural boundaries and exchanges.Keywords: danish cinema, transnational cinema, susanne bier, lone scherfig, national cinema
Procedia PDF Downloads 699154 Ethnicism and Nigeria's National Development Crisis
Authors: A. E. Agbogu
Abstract:
While scholars have predicted that identity politics (or what is euphemistically referred to as ethnic politics in Nigeria) were a dying phenomenon in other parts of the world, in Nigeria, it has remained the basis of political activity and has indeed become not only the unwritten law of all calculations in the political firmament of the country but also the ultimo ratio. We intend in the paper that follows to explore the reason for this unhealthy development. The paper seeks to offer explanations for the paradoxical reality of the upsurge of ethnic politics in Nigeria when in fact, the phenomenon is apparently on a downward spiral elsewhere in the world, particularly in countries that are at par with Nigeria in terms of national development. The paper is descriptive and qualitative and has relied on available data for its source of materials. Among other things, the paper locates identity politics as a tool in the hands of a national elite that has not transcended the limitations imposes by the shackles of the parsonian particularistic polar attributes which have tended to fixate their weltanschauung or world view on attachments that are unpardonably primordial. In the event, ethnicity becomes a veritable instrument not only for cheap sectional mobilization but also a means for seeking access to the so-called national cake. It is recommended that a way out of this socio-politico malady is the creation of a political arrangement that conduces to the gravitational tendency which will lead to the transfer of loyalties away from the extant ethno-nationalities to the centre.Keywords: ethnicism, development, crisis, identity politics
Procedia PDF Downloads 2839153 Exploring the Viability of Biogas Energy Potential in South Africa
Authors: Solomon Eghosa Uhunamure, Karabo Shale
Abstract:
Biogas technology has emerged as a promising solution for sustainable development, enhancing energy security while mitigating environmental hazards. Interest in biogas for household energy is growing due to its potential to address both energy and waste management challenges. To ensure biogas production contributes meaningfully to South Africa's future energy landscape, understanding public perceptions is essential for shaping effective policy measures. A household survey revealed that lower awareness of biogas correlates with reduced social and cultural acceptance, however, after providing basic information—such as a definition, a diagram, or one of two simple messages—support for biogas increased by 10% to 15% compared to the baseline. These findings highlight the critical role of awareness in building support for biogas as a key component of South Africa's decarbonization strategy.Keywords: awareness, barriers, biogas, environmental benefits, South Africa
Procedia PDF Downloads 329152 Urban Security and Social Sustainability in Cities of Developing Countries
Authors: Taimaz Larimian, Negin Sadeghi
Abstract:
Very little is known about the impacts of urban security on the level of social sustainability within the cities of developing countries. Urban security is still struggling to find its position in the social sustainability agenda, despite the significant role of safety and security on different aspects of peoples’ lives. This paper argues that urban safety and security should be better integrated within the social sustainability framework. With this aim, this study investigates the hypothesized relationship between social sustainability and Crime Prevention through Environmental Design (CPTED) approach at the neighborhood scale. This study proposes a model of key influential dimensions of CPTED analyzed into localized factors and sub-factors. These factors are then prioritized using pairwise comparison logic and fuzzy group Analytic Hierarchy Process (AHP) method in order to determine the relative importance of each factor on achieving social sustainability. The proposed model then investigates social sustainability in six case study neighborhoods of Isfahan city based on residents’ perceptions of safety within their neighborhood. Mixed method of data collection is used by using a self-administered questionnaire to explore the residents’ perceptions of social sustainability in their area of residency followed by an on-site observation to measure the CPTED construct. In all, 150 respondents from selected neighborhoods were involved in this research. The model indicates that CPTED approach has a significant direct influence on increasing social sustainability in neighborhood scale. According to the findings, among different dimensions of CPTED, ‘activity support’ and ‘image/ management’ have the most influence on people’s feeling of safety within studied areas. This model represents a useful designing tool in achieving urban safety and security during the development of more socially sustainable and user-friendly urban areas.Keywords: crime prevention through environmental design (CPTED), developing countries, fuzzy analytic hierarchy process (FAHP), social sustainability
Procedia PDF Downloads 3069151 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 3179150 National Digital Soil Mapping Initiatives in Europe: A Review and Some Examples
Authors: Dominique Arrouays, Songchao Chen, Anne C. Richer-De-Forges
Abstract:
Soils are at the crossing of many issues such as food and water security, sustainable energy, climate change mitigation and adaptation, biodiversity protection, human health and well-being. They deliver many ecosystem services that are essential to life on Earth. Therefore, there is a growing demand for soil information on a national and global scale. Unfortunately, many countries do not have detailed soil maps, and, when existing, these maps are generally based on more or less complex and often non-harmonized soil classifications. An estimate of their uncertainty is also often missing. Thus, there are not easy to understand and often not properly used by end-users. Therefore, there is an urgent need to provide end-users with spatially exhaustive grids of essential soil properties, together with an estimate of their uncertainty. One way to achieve this is digital soil mapping (DSM). The concept of DSM relies on the hypothesis that soils and their properties are not randomly distributed, but that they depend on the main soil-forming factors that are climate, organisms, relief, parent material, time (age), and position in space. All these forming factors can be approximated using several exhaustive spatial products such as climatic grids, remote sensing products or vegetation maps, digital elevation models, geological or lithological maps, spatial coordinates of soil information, etc. Thus, DSM generally relies on models calibrated with existing observed soil data (point observations or maps) and so-called “ancillary co-variates” that come from other available spatial products. Then the model is generalized on grids where soil parameters are unknown in order to predict them, and the prediction performances are validated using various methods. With the growing demand for soil information at a national and global scale and the increase of available spatial co-variates national and continental DSM initiatives are continuously increasing. This short review illustrates the main national and continental advances in Europe, the diversity of the approaches and the databases that are used, the validation techniques and the main scientific and other issues. Examples from several countries illustrate the variety of products that were delivered during the last ten years. The scientific production on this topic is continuously increasing and new models and approaches are developed at an incredible speed. Most of the digital soil mapping (DSM) products rely mainly on machine learning (ML) prediction models and/or the use or pedotransfer functions (PTF) in which calibration data come from soil analyses performed in labs or for existing conventional maps. However, some scientific issues remain to be solved and also political and legal ones related, for instance, to data sharing and to different laws in different countries. Other issues related to communication to end-users and education, especially on the use of uncertainty. Overall, the progress is very important and the willingness of institutes and countries to join their efforts is increasing. Harmonization issues are still remaining, mainly due to differences in classifications or in laboratory standards between countries. However numerous initiatives are ongoing at the EU level and also at the global level. All these progress are scientifically stimulating and also promissing to provide tools to improve and monitor soil quality in countries, EU and at the global level.Keywords: digital soil mapping, global soil mapping, national and European initiatives, global soil mapping products, mini-review
Procedia PDF Downloads 1849149 A Brief Review of Urban Green Vegetation (Green Wall) in Reduction of Air Pollution
Authors: Masoumeh Pirhadi
Abstract:
Air pollution is becoming a major health problem affecting millions. In support of this observation, the world health organization estimates that many people feel unhealthy due to pollution. This is a coupled fact that one of the main global sources of air pollution in cities is greenhouse gas emissions due heavy traffic. Green walls are developed as a sustainable strategy to reduce pollution by increasing vegetation in developed areas without occupying space in the city. This concept an offer advantageous environmental benefits and they can also be proposed for aesthetic purposes, and today they are used to preserve the urban environment. Green walls can also create environments that can promote a healthy lifestyle. Findings of multiple studies also indicate that Green infrastructure in cities is a strategy for improving air quality and increasing the sustainability of cities. Since these green solutions (green walls) act as porous materials that affect the diffusion of air pollution they can also act as a removing air vents that clean the air. Therefore, implementation of this strategy can be considered as a prominent factor in achieving a cleaner environment.Keywords: green vegetation, air pollution, green wall, urban area
Procedia PDF Downloads 1559148 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 4339147 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.Keywords: asymmetrical warfare, conventional forces, security, terrorism
Procedia PDF Downloads 2629146 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency
Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo
Abstract:
Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods
Procedia PDF Downloads 1499145 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 789