Search results for: security environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11055

Search results for: security environment

10065 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0

Authors: Mike Chia-Yu Huang

Abstract:

China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.

Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy

Procedia PDF Downloads 321
10064 Life-Saving Design Strategies for Nursing Homes and Long-Term Care Facilities

Authors: Jason M. Hegenauer, Nicholas Fucci

Abstract:

In the late 1990s, a major deinstitutionalization movement of elderly patients took place, since which, the design of long-term care facilities has not been adequately analyzed in the United States. Over the course of the last 25 years, major innovations in construction methods, technology, and medicine have been developed, drastically changing the landscape of healthcare architecture. In light of recent events, and the expected increase in elderly populations with the aging of the baby-boomer generation, it is evident that reconsideration of these facilities is essential for the proper care of aging populations. The global response has been effective in stifling this pandemic; however, widespread disease still poses an imminent threat to the human race. Having witnessed the devastation Covid-19 has reaped throughout nursing homes and long-term care facilities, it is evident that the current strategies for protecting our most vulnerable populations are not enough. Light renovation of existing facilities and previously overlooked considerations for new construction projects can drastically lower the risk at nursing homes and long-term care facilities. A reconfigured entry sequence supplements several of the features which have been long-standing essentials of the design of these facilities. This research focuses on several aspects identified as needing improvement, including indoor environment quality, security measures incorporated into healthcare architecture and design, and architectural mitigation strategies for sick building syndrome. The results of this study have been compiled as 'best practices' for the design of future healthcare construction projects focused on the health, safety, and quality of life of the residents of these facilities. These design strategies, which can easily be implemented through renovation of existing facilities and new construction projects, minimize risk of infection and spread of disease while allowing routine functions to continue with minimal impact, should the need for future lockdowns arise. Through the current lockdown procedures, which were implemented during the Covid-19 pandemic, isolation of residents has caused great unrest and worry for family members and friends as they are cut off from their loved ones. At this time, data is still being reported, leaving infection and death rates inconclusive; however, recent projections in some states list long-term care facility deaths as high as 60% of all deaths in the state. The population of these facilities consists of residents who are elderly, immunocompromised, and have underlying chronic medical conditions. According to the Centers for Disease Control, these populations are particularly susceptible to infection and serious illness. The obligation to protect our most vulnerable population cannot be overlooked, and the harsh measures recently taken as a response to the Covid-19 pandemic prove that the design strategies currently utilized for doing so are inadequate.

Keywords: building security, healthcare architecture and design, indoor environment quality, new construction, sick building syndrome, renovation

Procedia PDF Downloads 79
10063 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 174
10062 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 65
10061 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 416
10060 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 318
10059 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 282
10058 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 332
10057 Modeling and Simulation of Underwater Flexible Manipulator as Raleigh Beam Using Bond Graph

Authors: Sumit Kumar, Sunil Kumar, Chandan Deep Singh

Abstract:

This paper presents modeling and simulation of flexible robot in an underwater environment. The underwater environment completely contrasts with ground or space environment. The robot in an underwater situation is subjected to various dynamic forces like buoyancy forces, hydrostatic and hydrodynamic forces. The underwater robot is modeled as Rayleigh beam. The developed model further allows estimating the deflection of tip in two directions. The complete dynamics of the underwater robot is analyzed, which is the main focus of this investigation. The control of robot trajectory is not discussed in this paper. Simulation is performed using Symbol Shakti software.

Keywords: bond graph modeling, dynamics. modeling, rayleigh beam, underwater robot

Procedia PDF Downloads 571
10056 Localization of Near Field Radio Controlled Unintended Emitting Sources

Authors: Nurbanu Guzey, S. Jagannathan

Abstract:

Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.

Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)

Procedia PDF Downloads 513
10055 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 21
10054 Environment Patterns and Mental Health of Older Adults in Long-Term Care Facilities: The Role of Activity Profiles

Authors: Shiau-Fang Chao, Yu-Chih Chen

Abstract:

Owing to physical limitations and restrained lifestyle, older long-term care (LTC) residents are more likely to be affected by their environment than their community-dwelling counterparts. They also participate fewer activities and experience worse mental health than healthy older adults. This study adopts the ICF model to determine the extent to which the clustered patterns of LTC environment and activity participation are associated with older residents’ mental health. Method: Data were collected from a stratified equal probability sample of 634 older residents in 155 LTC institutions in Taiwan. Latent profile analysis (LPA) and latent class analysis (LCA) were conducted to explore the profiles for environment and activity participation. Multilevel modeling was performed to elucidate the relationships among environment profiles, activity profiles, and mental health. Results: LPA identified three mutually exclusive environment profiles (Low-, Moderate-, and High-Support Environment) based on the physical, social, and attitudinal environmental domains, consolidated from 12 environmental measures. LCA constructed two distinct activity profiles (Low- and High-Activity Participation) across seven activity domains (outdoor, volunteer-led leisure, spiritual, household chores, interpersonal exchange, social, and sedentary activity) that were factored from 20 activities. Compared to the Low-Support Environment class, older adults in the Moderate- and High-Support Environment classes had better mental health. Older residents in the Moderate- and High-Support Environment classes were more likely to be in the “High Activity” class, which in turn, exhibited better mental health. Conclusion: This study advances the current knowledge through rigorous methods and study design. The study findings lead to several conclusions. First, this study supports the use of ICF framework to institutionalized older individuals with functional limitations and demonstrates that both measures of environment and activity participation can be refined from multiple indicators. Second, environmental measures that encompass the physical, social, and attitudinal domains would provide a more comprehensive assessment on the place where an older individual embeds. Third, simply counting activities in which an older individual participates or considering a certain type of activity may not capture his or her way of life. Practitioners should not only focus on group or leisure activities within the institutions; rather, more efforts should be made to consider residents’ preferences for everyday life and support their remaining ability by encouraging continuous participation in activities they still willing and capable to perform. Fourth, environment and activity participation are modifiable factors which have greater potential to strengthen older LTC residents’ mental health, and activity participation should be considered in the link between environment and mental health. A combination of enhanced physical, social, and attitudinal environments, and continual engagement in various activities may optimize older LTC residents’ mental health.

Keywords: activity, environment, mental health, older LTC residents

Procedia PDF Downloads 173
10053 Intellectual Property Risk Assessment in Planning Market Entry to China

Authors: Qing Cao

Abstract:

Generally speaking, China has a relatively high level of intellectual property (IP) infringement. Risk assessment is indispensable in the strategic planning process. To complement the current literature in international business, the paper sheds the light on how to assess IP risk for foreign companies in planning market entry to China. Evaluating internal and external IP environment, proposed in the paper, consists of external analysis, internal analysis and further internal analysis. Through position the company’s IP environment, the risk assessment approach enables the foreign companies to either build the corresponding IP strategies or abort the entry plan beforehand to minimize the IP risks.

Keywords: intellectual property, IP environment, risk assessment

Procedia PDF Downloads 542
10052 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment

Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad

Abstract:

According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.

Keywords: security, electronic banking, one time password, information technology

Procedia PDF Downloads 435
10051 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 129
10050 Sustainability of the Built Environment of Ranchi District

Authors: Vaidehi Raipat

Abstract:

A city is an expression of coexistence between its users and built environment. The way in which its spaces are animated signify the quality of this coexistence. Urban sustainability is the ability of a city to respond efficiently towards its people, culture, environment, visual image, history, visions and identity. The quality of built environment determines the quality of our lifestyles, but poor ability of the built environment to adapt and sustain itself through the changes leads to degradation of cities. Ranchi was created in November 2000, as the capital of the newly formed state Jharkhand, located on eastern side of India. Before this Ranchi was known as summer capital of Bihar and was a little larger than a town in terms of development. But since then it has been vigorously expanding in size, infrastructure as well as population. This sudden expansion has created a stress on existing built environment. The large forest covers, agricultural land, diverse culture and pleasant climatic conditions have degraded and decreased to a large extent. Narrow roads and old buildings are unable to bear the load of the changing requirements, fast improving technology and growing population. The built environment has hence been rendered unsustainable and unadaptable through fastidious changes of present era. Some of the common hazards that can be easily spotted in the built environment are half-finished built forms, pedestrians and vehicles moving on the same part of the road. Unpaved areas on street edges. Over-sized, bright and randomly placed hoardings. Negligible trees or green spaces. The old buildings have been poorly maintained and the new ones are being constructed over them. Roads are too narrow to cater to the increasing traffic, both pedestrian and vehicular. The streets have a large variety of activities taking place on them, but haphazardly. Trees are being cut down for road widening and new constructions. There is no space for greenery in the commercial as well as old residential areas. The old infrastructure is deteriorating because of poor maintenance and the economic limitations. Pseudo understanding of functionality as well as aesthetics drive the new infrastructure. It is hence necessary to evaluate the extent of sustainability of existing built environment of the city and create or regenerate the existing built environment into a more sustainable and adaptable one. For this purpose, research titled “Sustainability of the Built Environment of Ranchi District” has been carried out. In this research the condition of the built environment of Ranchi are explored so as to figure out the problems and shortcomings existing in the city and provide for design strategies that can make the existing built-environment sustainable. The built environment of Ranchi that include its outdoor spaces like streets, parks, other open areas, its built forms as well as its users, has been analyzed in terms of various urban design parameters. Based on which strategies have been suggested to make the city environmentally, socially, culturally and economically sustainable.

Keywords: adaptable, built-environment, sustainability, urban

Procedia PDF Downloads 225
10049 Effect of Postweld Soaking Temperature on Mechanical Properties of AISI 1018 Steel Plate Welded in Aqueous Environment

Authors: Yahaya Taiwo, Adedayo M. Segun

Abstract:

This study investigated the effect of postweld soaking temperature on mechanical properties of AISI 1018 steel plate welded in aqueous environment. Pairs of 90 x 70 x 12 mm, AISI 1018 steel plates were welded with weld zone beyond distance 10 mm from weld centerline immersed in a water jacket at 25°C. The welded specimens were tempered at temperature of 200, 300, 400, 500 and 600°C for 1.5 hours. Tensile, hardness and toughness tests at distances 15, 30, 45 and 60 mm from the weld centreline with micro structural evaluation were carried out. The results show that the aqueous environment as-weld sample exhibited higher hardness and tensile strength values of 45.3 HV and 448.12 N/mm2 respectively while the hardness and tensile strength of aqueous environment postweld heat treated samples were 44.9 HV and 378.98 N/mm2. This revealed 0.82% and 15.4% reduction in hardness and strength respectively. The metallographic tests showed that the postweld heat treated AISI 1018 steel micro structure contained tempered martensite with ferritic structure and precipitation of carbides. Postweld heat treatment produced materials of lower hardness and improved toughness.

Keywords: air weld samples, aqueous environment weld samples, soaking temperature, water jacket

Procedia PDF Downloads 322
10048 Agricultural Solid Wastes Generation in Nigeria and Their Recycling Potentials into Building Materials

Authors: Usman Aliyu Jalam, Shuaibu Alolo Sumaila, Sa’adiya Iliyasu Muhammed

Abstract:

Modern building industry lays much emphasis on sophisticated materials that have high embodied energy with intrinsic distinctiveness for damaging the environment. But today, advances in solid waste management have resulted in alternative building materials as partial or complete replacement of the conventional materials like cement, aggregate etc particularly for low cost housing. Investigations carried out revealed that an estimated 18.0 million tonnes of agricultural solid wastes are being generated in Nigeria annually. This constitutes a problem not only to the natural environment but also to the built environment more particularly with the way the wastes are being dispose of. The paper has discussed the present status on the generation and utilisation of agricultural solid wastes, their recycling potentials and environmental implications. It further discovered that although considerable quantity of these wastes were found to have the potentials of being recycled as building materials, the availability of the appropriate technology remains a big challenge in the country. Moreover, majority of the wastes type have gained popularity as fuel. As such, the economic and environmental benefits of recycling the wastes and the use of the wastes as fuel need further investigation.

Keywords: agricultural waste, building, environment, materials, Nigeria

Procedia PDF Downloads 383
10047 Eco-Tourism: A Need for Sustainable Development

Authors: Chandni Laddha

Abstract:

Tourism was earlier considered as an activity performed by people only for the purpose of entertainment. However, the present era demand for adding something more to the concept of tourism. Nowadays, people are more protected towards environment, so this paper focuses on the significance of ecotourism for the attainment of sustainable development. Ecotourism is a way of sustainable growth of tourist spots maintaining their natural and actual status quo. The ecotourism in India becomes all the more important because India is famous on world map. Ecotourism believe that there should be sustainable equation between tourist and tourist place. Various aspects related to environmental tourism will be highlighted in this paper. Government efforts for the promotion of ecotourism will be discussed by explaining the tourism policy of India, some acts, rules etc. will also be discussed. The study comes up with some strategies to be adopted and which will lead in promoting the concept of ecotourism for an ecologically sustainable environment.

Keywords: tourism, eco-tourism, sustainable development, tourism policy, sustainable environment

Procedia PDF Downloads 414
10046 Impact of Agricultural Waste Utilization and Management on the Environment

Authors: Ravi Kumar

Abstract:

Agricultural wastes are the non-product outcomes of agricultural processing whose monetary value is less as compared to its collection cost, transportation, and processing. When such agricultural waste is not properly disposed of, it may damage the natural environment and cause detrimental pollution in the atmosphere. Agricultural development and intensive farming methods usually result in wastes that remarkably affect the rural environments in particular and the global environment in general. Agricultural waste has toxicity latent to human beings, animals, and plants through various indirect and direct outlets. The present paper explores the various activities that result in agricultural waste and the routes that can utilize the agricultural waste in a manageable manner to reduce its adverse impact on the environment. Presently, the agricultural waste management system for ecological agriculture and sustainable development has emerged as a crucial issue for policymakers. There is an urgent need to consider agricultural wastes as prospective resources rather than undesirable in order to avoid the transmission and contamination of water, land, and air resources. Waste management includes the disposal and treatment of waste with a view to eliminate threats of waste by modifying the waste to condense the microbial load. The study concludes that proper waste utilization and management will facilitate the purification and development of the ecosystem and provide feasible biofuel resources. This proper utilization and management of these wastes for agricultural production may reduce their accumulation and further reduce environmental pollution by improving environmental health.

Keywords: agricultural waste, utilization, management, environment, health

Procedia PDF Downloads 76
10045 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 419
10044 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia

Authors: Rachel Thomas Tharmabalan

Abstract:

The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.

Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems

Procedia PDF Downloads 142
10043 Assessment of Academic Knowledge Transfer Channels in Field of Environment

Authors: Jagul Huma Lashari, Arabella Bhutto

Abstract:

Last few years have shown increased an interest of researchers in knowledge and technology transfer. However, facts show fewer types of knowledge transfer practices in the developing countries. This article focuses on assessment transfer channels of academic research produced by highly qualified academicians working in universities in Sindh offering degrees in field of an Environment in Sindh Pakistan. The academic field has been chosen because in field of the environment there is alarming need of research into practice for sustainable development. Using case study approach; in this research qualitative interviews have been conducted from PhD faculty members working in the universities offering degrees in field of environment. Obtained data is analyzed using descriptive statistics and chi-square test with the help of statistical packages for social sciences (SPSS). Research explored 31 channels of academic knowledge transfer from detailed review of literature and exploratory interviews with participants. Identified knowledge transfer channels have been grouped together in 6 groups of knowledge transfer channels; As knowledge transfer through publications, networking, mobility of researchers, joint research, intellectual property and co-operations. Results revealed that academic knowledge have been transferred through publications, networking, and co-operation. However, less number of academic knowledge has been transferred through groups of knowledge transfer channels such as Intellectual Property and joint research.

Keywords: environment, research knowledge, transfer channels, universities

Procedia PDF Downloads 322
10042 Regenerative Tourism: Industry Readiness for the Big Shift

Authors: Renuka Mahadevan, Maneka Jayasinghe, Dianne Dredge

Abstract:

Over the last two years, tourism has been subject to unprecedented changes, and experts predict further change, especially with respect to travel and tourism choices. As concerns regarding the environment and climate change grow, many tourism industry stakeholders are particularly keen on taking steps to mitigate the adverse impacts of the travel industry to the broader society and environment. This approach and process is commonly referred to as 'Sustainable Tourism'. An emerging concept that extends beyond 'sustainable tourism' is 'Regenerative Tourism', which aims to impact the local systems, society and environment positively. In particular, it aims to provide transformational experiences to tourists and thereby inspire the travellers while the local cultural heritage and traditions are preserved from generation to generation. This study analyses how tourism stakeholders are shifting their attitude towards travel and tourism, particularly regarding its impact on people, places, businesses and the environment. The analysis will be based on a global survey of 1200 businesses, tourism organisations, employees, and travel consumers. The preliminary analysis of responses reveals a high interest towards transformational experiences during travel.

Keywords: regenerative tourism, transformational, experience, local systems

Procedia PDF Downloads 58
10041 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 118
10040 An Adaptive Virtual Desktop Service in Cloud Computing Platform

Authors: Shuen-Tai Wang, Hsi-Ya Chang

Abstract:

Cloud computing is becoming more and more matured over the last few years and consequently the demands for better cloud services is increasing rapidly. One of the research topics to improve cloud services is the desktop computing in virtualized environment. This paper aims at the development of an adaptive virtual desktop service in cloud computing platform based on our previous research on the virtualization technology. We implement cloud virtual desktop and application software streaming technology that make it possible for providing Virtual Desktop as a Service (VDaaS). Given the development of remote desktop virtualization, it allows shifting the user’s desktop from the traditional PC environment to the cloud-enabled environment, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. Users no longer need to burden the platform maintenances and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote desktop service represents the next significant step to the mobile workplace, and it lets users access their desktop environments from virtually anywhere.

Keywords: cloud computing, virtualization, virtual desktop, VDaaS

Procedia PDF Downloads 271
10039 Application of WebGIS-Based Water Environment Capacity Inquiry and Planning System in Water Resources Management

Authors: Tao Ding, Danjia Yan, Jinye Li, Chao Ren, Xinhua Hu

Abstract:

The paper based on the research background of the current situation of water shortage in China and intelligent management of water resources in the information era. And the paper adopts WebGIS technology, combining the mathematical model of water resources management to develop a WebGIS-based water environment capacity inquiry and polluted water emission planning. The research significance of the paper is that it can inquiry the water environment capacity of Jinhua City in real time and plan how to drain polluted water into the river, so as to realize the effective management of water resources. This system makes sewage planning more convenient and faster. For the planning of the discharge enterprise, the decision on the optimal location of the sewage outlet can be achieved through calculation of the Sewage discharge planning model in the river, without the need for site visits. The system can achieve effective management of water resources and has great application value.

Keywords: sewerage planning, water environment capacity, water resources management, WebGIS

Procedia PDF Downloads 165
10038 New Tools and New Ways; Changing the Nature of Leadership and Future Challenges

Authors: Harun Ozdemirci

Abstract:

Complexity and chaos are the characteristics of our new world today. Either business or governmental sector, inner and outer environment changes in all aspects. To ensure leaders to guide organizations accurately and effectively, leaders also must change their attitudes towards this changing world . We need new tools, new mindsets and new views for new century. Every leader have to operate within an cerative and innovative way of thinking. But how it will occur and at which direction it will be managed or directed? What kind of abilities and attitudes make leader compatible with this ever-changing and ambigous environment? Leader who will lead in the future must have some special skillls. But how can we develop these skills and behaviours? What must be the mindset of a future leader? This paper searchs for answers of some of these questions. But asking questions is more important than giving answers to them. Innovation and creativity have been at the centerpiece of our lives for some years. But we don’t know how to manage and how to tackle with the challenges come up with this new situation. This new world order compel us to take some new positions against new employees who have different types of lives and habits, new productivity processes, new adversaries… Future environment will not be the same as we experience before. So, our responses to this new environment can not be the same as our predecessors gave. We have to innovate new ways of thinking, and new tools for solving new type of problems.

Keywords: innovation, creativity, leader, future, liberal arts

Procedia PDF Downloads 260
10037 Learning Management System Technologies for Teaching Computer Science at a Distance Education Institution

Authors: Leila Goosen, Dalize van Heerden

Abstract:

The performance outcomes of first year Computer Science and Information Technology students across the world are of great concern, whether they are being taught in a face-to-face environment or via distance education. In the face-to-face environment, it is, however, somewhat easier to teach and support students than it is in a distance education environment. The face-to-face academic can more easily gauge the level of understanding and participation of students and implement interventions to address issues, which may arise. With the inroads that Web 2.0 and Web 3.0 technologies are making, the world of online teaching and learning are rapidly expanding, bringing about technologies, which allows for similar interactions between online academics and their students as available to their face-to-face counter parts. At the University of South Africa (UNISA), the Learning Management System (LMS) is called myUNISA and it is deployed on a SAKAI platform. In this paper, we will take a look at some of the myUNISA technologies implemented in the teaching of a first year programming course, how they are implemented and, in some cases, we will indicate how this affects the performance outcomes of students.

Keywords: computer science, Distance Education Technologies, Learning Management System, face-to-face environment

Procedia PDF Downloads 481
10036 Structure Design of Vacuum Vessel with Large Openings for Spacecraft Thermal Vacuum Test

Authors: Han Xiao, Ruan Qi, Zhang Lei, Qi Yan

Abstract:

Space environment simulator is a facility used to conduct thermal test for spacecraft, and vacuum vessel is the main body of it. According to the requirements for thermal tests of the spacecraft and its solar array panels, the primary vessel and the side vessels are designed to be a combinative structure connected with aperture, which ratio reaches 0.7. Since the vacuum vessel suffers 0.1MPa external pressure during the process of thermal test, in order to ensure the simulator’s reliability and safety, it’s necessary to calculate the vacuum vessel’s intensity and stability. Based on the impact of large openings to vacuum vessel structure, this paper explored the reinforce design and analytical way of vacuum vessel with large openings, using a large space environment simulator’s vacuum vessel design as an example. Tests showed that the reinforce structure is effective to fulfill the requirements of external pressure and the gravity. This ensured the reliability of the space environment simulator, providing a guarantee for developing the spacecraft.

Keywords: vacuum vessel, large opening, space environment simulator, structure design

Procedia PDF Downloads 511