Search results for: income security
3335 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3183334 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States
Authors: Muhammad Jawad Hashmi
Abstract:
The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan
Procedia PDF Downloads 3563333 Gestational Diabetes Mellitus (GDM) Knowledge Levels of Pregnant Women with GDM and Affecting Factors
Authors: Nuran Nur Aypar, Merlinda Alus Tokat
Abstract:
The aim of the study is to determine the knowledge level of pregnant women with Gestational Diabetes Mellitus (GDM) about the disease and affecting factors. The data of this descriptive study were collected from 184 pregnant women who were followed up in Dokuz Eylul University Hospital (n=34), Izmir Ege Maternity Hospital, Gynecology Training and Research Hospital (n=133), and Egepol Private Hospital (n=17). Data collection forms were prepared by the researcher according to the literature. ANOVA test, Kruskal Wallis test, Mann-Whitney U test, Student’s t-test, and Pearson correlation test were used for statistical analyses. Average GDM knowledge score of pregnant women was 40.10±19.56. The GDM knowledge scores were affected by factors such as age, educational level, working status, income status, educational level of the spouse, and the GDM background. It has been shown in our study that the GDM knowledge scores were negatively affected by factors such as young age, low educational level, low-income level, unemployment, having a spouse with low educational level, the absence of the GDM story. It has been identified that 86.4% of the pregnant women were trained about GDM. The education provided in the antenatal period significantly increased GDM knowledge scores of pregnant women (p=0.000, U=515.0). It has been determined that GDM knowledge of the pregnant women with GDM is affected by various factors. These factors must be considered in order to determine new strategies.Keywords: affecting factors, gestational diabetes mellitus (GDM), knowledge level, nursing, pregnancy
Procedia PDF Downloads 3403332 Taiwanese Families' Perspectives: Promoting Foundations of Self-Determination Skills for Young Children with Special Needs
Authors: Szu-Yin Chu
Abstract:
Self-determination has been particularly influential in obtaining a better quality of life through successful transition processes for students with disabilities. The development of self-determination through learning has raised attention at an early age. This study used a survey questionnaire to construct the understanding of the self-determination in Taiwan, learn the perspectives about the environmental and situational contexts where the respondents expect children to display self-determination skills in different cultures. Specifically, the research questions are: (a) What are Taiwanese families’ general perspectives about the development of foundations of self-determination for young children with special needs? and (b) how does families’ demographic background (i.e., income level, educational background) and child characteristics (i.e., age, emotional or behavior problems) impact Taiwanese families’ perspectives on the foundations of self-determination across three critical components (i.e., choice-making and problem-solving, self-regulation, and engagement) for young children with special needs? Data from 125 participants were gathered and analyzed. The findings suggested that Taiwanese families showed very positive attitudes toward promoting a foundation of self-determination for young children with special needs. Families’ income level and child’s severity of emotional/behavioral problems were two variables that were found to impact families’ views on their child’s foundational self-determination skills. Implications for future research and practice in supporting families to promote foundations of self-determination for young children with special needs will be provided.Keywords: disabilities, self-determination, Taiwan, young children
Procedia PDF Downloads 3013331 4P-Model of Information Terrorism
Authors: Nataliya Venelinova
Abstract:
The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.Keywords: information terrorism, mass communication cycle, public perception, security
Procedia PDF Downloads 1733330 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script
Authors: Yash Goyal, Manish Korde, Juned Siddiqui
Abstract:
Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.Keywords: responsive, accessible, attractive, interface, objective, security.
Procedia PDF Downloads 1023329 Together - A Decentralized Application Connects Ideas and Investors
Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith
Abstract:
Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding
Procedia PDF Downloads 2143328 College Readiness Outcomes of No Child Left Behind: A Critical Analysis
Authors: Tianyu Chen
Abstract:
The No Child Left Behind Act (NCLB) of 2001 was a major federal education policy that aimed to improve academic outcomes for all students in the United States. This study examines whether NCLB improved college readiness, measured by access to higher education, for different demographic groups. Using data from the Integrated Public Use Microdata Series (IPUMS) from 2003-2008, regression analyses explore the relationship between gender, race, family income, and region with occupational education score. The results indicate that NCLB implementation had a positive effect on college access for women and Asian students compared to other groups. Higher family income was also associated with an increased likelihood of pursuing higher education, especially for families in the South. While NCLB intended to close achievement gaps, disparities in college readiness remained five years after implementation. Further research could examine longer-term trends and additional factors influencing the policy's effectiveness across student subgroups. This study provides evidence that simply holding schools accountable for test scores may not sufficiently improve equitable educational outcomes. More targeted support of disadvantaged groups may be needed to fulfill the goal of "no child left behind."Keywords: no child left behind act, college readiness, achievement gaps, educational equity
Procedia PDF Downloads 543327 Life Course Events, Residential and Job Relocation and Commute Time in Australian Cities
Authors: Solmaz Jahed Shiran, Elizabeth Taylor, John Hearne
Abstract:
Over the past decade a growing body of research, known as mobility biography approach has emerged that focuses on changes in travel behaviour over the life course of individuals. Mobility biographies suggest that changes in travel behaviour have a certain relation to important key events in life courses such as residential relocation, workplace changes, marriage and the birth of children. Taking this approach as the theoretical background, this study uses data from the Household, Income and Labor Dynamics Survey in Australia (HILDA) to model a set of life course events and their interaction with the commute time. By analysing longitudinal data, it is possible to assign different key events during the life course to change a person’s travel behaviour. Changes in the journey-to-work travel time is used as an indication of travel behaviour change in this study. Results of a linear regression model for change in commute time show a significant influence from socio-demographic factors like income and age, the previous home-to-work commute time and remoteness of the residence. Residential relocation and job change have significant influences on commute time. Other life events such as birth of a child, marriage and divorce or separation have also a strong impact on commute time change. Overall, the research confirms previous studies of links between life course events and travel behaviour.Keywords: life course events, residential mobility, travel behaviour, commute time, job change
Procedia PDF Downloads 2053326 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis
Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo
Abstract:
The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.Keywords: IoT, ethical concerns, privacy, safety, security, smart devices
Procedia PDF Downloads 853325 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 5403324 Determinants of Mobile Banking Apps Adoption among Bank Customers in Ghana
Authors: Masud Ibrahim
Abstract:
in Ghana. The sample of the study comprised 450 bank customers from universal banks operating in Ghana. A conceptual framework was framed from a revised TAM model. A total of nine hypotheses were developed and tested using Structural Equation Modeling Technique. Findings from this study revealed that perceived ease of use and perceived usefulness are influenced positively by design and perceived security. Also, perceived ease of use, social influence and perceived security risk were found to have a strong influence on mobile banking app adoption intention. This study provides significant insights and implications for banking organizations on how to ensure the adoption and usage of their mobile banking apps.Keywords: mobile banking app, perceived ease of use, perceived usefulness, technology acceptance model
Procedia PDF Downloads 1613323 Chronic Aflatoxin Exposure During Pregnancy Is Associated With Lower Fetal Growth Trajectories: A Prospective Cohort Study in Rural Ethiopia
Authors: K. Tesfamariam, S. Gebreyesus, C. Lachat, P. Kolsteren, S. De Saeger, M. De Boevre, A. Argaw
Abstract:
Aflatoxins are toxic secondary metabolites produced by Aspergillus fungi, which are ubiquitously present in the food supplies of low- and middle-income countries. Studies of maternal aflatoxin exposure and fetal outcomes are mainly focused on size at birth and the effect on intrauterine fetal growth has not been assessed using repeated longitudinal fetal biometry across gestation. Therefore, this study intends to assess the association between chronic aflatoxin exposure during pregnancy and fetal growth trajectories in a rural Ethiopian setting. In a prospective cohort study, we enrolled 492 pregnant women. A phlebotomist collected 5 mL of a venous blood sample from eligible women before 28 completed weeks of gestation and aflatoxin B1-lysine concentration was determined using liquid chromatography-tandem mass spectrometry. The mean (±SD) gestational age was 19.1 (3.71) weeks at enrollment, and 28.5 (3.51) and 34.5 (2.44) weeks of gestation at the second and third rounds of ultrasound measurements, respectively. Estimated fetal weight was expressed in centiles using the INTERGROWTH-21st reference. We fitted a multivariable linear mixed-effects model to estimate the rate of fetal growth between aflatoxin-exposed (i.e., aflatoxin B1-lysine concentration above or equal to the limit of detection) and non-exposed mothers in the study. Mothers had a mean (±SD) age of 26.0 (4.58) years. The median (P25, P75) serum AFB1-lysine concentration was 12.6 (0.93, 96.9) pg/mg albumin, and aflatoxin exposure was observed in 86.6% of maternal blood samples. Eighty-five percent of the women enrolled provided at least two ultrasound measurements for analysis. On average, the aflatoxin-exposed group had a significantly lower change over time in fetal weight-for-gestational age centile than the unexposed group (ß = -1.01 centiles/week, 95% CI: -1.87, -0.15, p = 0.02). Chronic maternal AF exposure is associated with lower fetal weight gain over time. Our findings emphasize the importance of nutrition-sensitive strategies to mitigate dietary aflatoxin exposure as well as adopting food safety measures in low-income settings, particularly during the fetal period of development.Keywords: aflatoxin, fetal growth, low-income setting, mycotoxins
Procedia PDF Downloads 1423322 The Management of Climate Change by Indigenous People: A Focus on Himachal Pradesh, India
Authors: Anju Batta Sehgal
Abstract:
Climate change is a major challenge in terms of agriculture, food security and rural livelihood for thousands of people especially the poor in Himachal, which falls in North-Western Himalayas. Agriculture contributes over 45 per cent to net state domestic product. It is the main source of income and employment. Over 93 per cent of population is dependent on agriculture which provides direct employment to 71 percent of its people. Area of operation holding is about 9,79 lakh hectares owned by 9.14 lakh farmers. About 80 per cent area is rain-fed and farmers depend on weather gods for rains. Region is a home of diverse ethnic communities having enormous socio-economic and cultural diversities, gifted with range of farming systems and rich resource wealth, including biodiversity, hot spots and ecosystems sustaining millions of people living in the region. But growing demands of ecosystem goods and services are posing threats to natural resources. Climate change is already making adverse impact on the indigenous people. The rural populace is directly dependent for all its food, shelter and other needs on the climate. Our aim should be to shift the focus to indigenous people as primary actors in terms of global climate change monitoring, adaptations and innovations. Objective of this paper is to identify the climate change related threats and vulnerabilities associated with agriculture as a sector and agriculture as people’s livelihood. Broadly it analyses the connections between the nature and rural consumers the ethnic groups.Keywords: climate change, agriculture, indigenous people, Himachal Pradesh
Procedia PDF Downloads 2723321 Structural Inequality and Precarious Workforce: The Role of Labor Laws in Destabilizing the Labor Force in Iran
Authors: Iman Shabanzadeh
Abstract:
Over the last three decades, the main demands of the Iranian workforce have been focused on three areas: "The right to a decent wage", "The right to organize" and "The right to job security". In order to investigate and analyze this situation, the present study focuses on the component of job security. The purpose of the study is to figure out what mechanisms in Iran's Labor Law have led to the destabilization and undermining of workers' job security. The research method is descriptive-analytical. To collect information, library and document sources in the field of laws related to labor rights in Iran and, semi-structured interviews with experts have been used. In the data analysis stage, the qualitative content analysis method was also used. The trend analysis of the statistics related to the labor force situation in Iran in the last three decades shows that the employment structure has been facing an increase in the active population, but in the last decade, a large part of this population has been mainly active in the service sector, and contract-free enterprises, so a smaller share of this employment has insurance coverage and a larger share has underemployment. In this regard, the results of this study show that four contexts have been proposed as the main legal and executive mechanisms of labor instability in Iran, which are: 1) temporaryization of the labor force by providing different interpretations of labor law, 2) adjustment labor in the public sector and the emergence of manpower contracting companies, 3) the cessation of labor law protection of workers in small workshops and 4) the existence of numerous restrictions on the effective organization of workers. The theoretical conclusion of this article is that the main root of the challenges of the labor society and the destabilized workforce in Iran is the existence of structural inequalities in the field of labor security, whose traces can be seen in the legal provisions and executive regulations of this field.Keywords: inequality, precariat, temporaryization, labor force, labor law
Procedia PDF Downloads 613320 English and Information and Communication Technology: Zones of Exclusion in Education in Low-Income Countries
Authors: Ram A. Giri, Amna Bedri, Abdou Niane
Abstract:
Exclusion in education on the basis of language in multilingual contexts operates at multiple levels. Learners of diverse ethnolinguistic backgrounds are often expected to learn through English and are pushed further down the learning ladder if they also have to access education through Information and Communication Technology (ICT). The paper explores marginalized children’s lived experiences in accessing technology and English in four low-income countries in Africa and Asia. Based on the findings of the first phase of a multinational qualitative research study, we report on the factors or barriers that affect children’s access, opportunities and motivation for learning through technology and English. ICT and English - the language of ICT and education - can enhance learning and can even be essential. However, these two important keys to education can also function as barriers to accessing quality education, and therefore as zones of exclusion. This paper looks into how marginalized children (aged 13-15) engage in learning through ICT and English and to what extent the restrictive access and opportunities contribute to the widening of the already existing gap in education. By applying the conceptual frameworks of “access and accessibility of learning” and “zones of exclusion,” the paper elucidates how the barriers prevent children’s effective engagement with learning and addresses such questions as to how marginalized children access technology and English for learning; whether the children value English, and what their motivation and opportunity to learn it are. In addition, the paper will point out policy and pedagogic implications.Keywords: exclusion, inclusion, inclusive education, marginalization
Procedia PDF Downloads 2303319 Determinants of Pupils' Performance in the National Achievement Test in Public Elementary Schools of Cavite City
Authors: Florenda B. Cardinoza
Abstract:
This study was conducted to determine the determinants of Grade III and grade VI pupils’ performance in the National Achievement Test in the Division of Cavite City, School Year 2011-2012. Specifically, the research aimed to: (1) describe the demographic profile of the respondents in terms of age, sex, birth order, family size, family income, and occupation of parents; (2) determine the level of attitude towards NAT; and (3) describe the degree of relationship between the following variables: school support, teachers’ support, and lastly family support for the pupils’ performance in 2012 NAT. The study used the descriptive-correlation research method to investigate the determinants of pupils’ performance in the National Achievement Test of Public Elementary Schools in the Division of Cavite City. The instrument used in data gathering was a self-structured survey. The NAT result for SY 2011-2012 provided by NETRC and DepEd Cavite City was also utilized. The statistical tools used to process and analyze the data were frequency distribution, percentage, mean, standard deviation, Kruskall Wallis, Mann-Whitney, t-test for independent samples, One-way ANOVA, and Spearman Rank Correlational Coefficient. Results revealed that there were more female students than males in the Division of Cavite City; out of 659 respondents, 345 were 11 years old and above; 390 were females; 283 were categorized as first child in the family; 371 of the respondents were from small family; 327 had Php5000 and below family income; 450 of the fathers’ respondents were non professionals; and 431 of the mothers respondents had no occupation. The attitude towards NAT, with a mean of 1.65 and SD of .485, shows that respondents considered NAT important. The school support towards NAT, with a mean of 1.89 and SD of .520, shows that respondents received school support. The pupils had a very high attitude towards teachers’ support in NAT with a mean of 1.60 and SD of .572. Family support, with t-test of 16.201 with a p-value of 0.006, shows significant at 5 percent level. Thus, the determinants of pupils’ performance in NAT in terms of family support for NAT preparation is not significant according to their family income. The grade level, with the t-test is 4.420 and a p-value of 0.000, is significant at 5 percent level. Therefore, the determinants of pupils’ performance in NAT in terms of grade level for NAT preparation vary according to their grade level. For the determinants of pupils’ performance of NAT sample test for attitude towards NAT, school support, teachers’ support, and family support were noted highly significant with a p value of 0.000.Keywords: achievement, determinants, national, performance, public, pupils', test
Procedia PDF Downloads 3503318 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges
Authors: Murtala Gada Abubakar, Aliyu T. Umar
Abstract:
A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.Keywords: basement complex, hydrological processes, Sokoto Basin, water security
Procedia PDF Downloads 3193317 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1533316 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 1013315 Climate Change and Migration in the Semi-arid Tropic and Eastern Regions of India: Exploring Alternative Adaptation Strategies
Authors: Gauri Sreekumar, Sabuj Kumar Mandal
Abstract:
Contributing about 18% to India’s Gross Domestic Product, the agricultural sector plays a significant role in the Indian rural economy. Despite being the primary source of livelihood for more than half of India’s population, most of them are marginal and small farmers facing several challenges due to agro-climatic shocks. Climate change is expected to increase the risk in the regions that are highly agriculture dependent. With systematic and scientific evidence of changes in rainfall, temperature and other extreme climate events, migration started to emerge as a survival strategy for the farm households. In this backdrop, our present study aims to combine the two strands of literature and attempts to explore whether migration is the only adaptation strategy for the farmers once they experience crop failures due adverse climatic condition. Combining the temperature and rainfall information from the weather data provided by the Indian Meteorological Department with the household level panel data on Indian states belonging to the Eastern and Semi-Arid Tropics regions from the Village Dynamics in South Asia (VDSA) collected by the International Crop Research Institute for the Semi-arid Tropics, we form a rich panel data for the years 2010-2014. A Recursive Econometric Model is used to establish the three-way nexus between climate change-yield-migration while addressing the role of irrigation and local non-farm income diversification. Using Three Stage Least Squares Estimation method, we find that climate change induced yield loss is a major driver of farmers’ migration. However, irrigation and local level non-farm income diversification are found to mitigate the adverse impact of climate change on migration. Based on our empirical results, we suggest for enhancing irrigation facilities and making local non-farm income diversification opportunities available to increase farm productivity and thereby reduce farmers’ migration.Keywords: climate change, migration, adaptation, mitigation
Procedia PDF Downloads 643314 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens
Authors: Michelle D. Hand, Michelle L. Kaiser
Abstract:
African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu
Procedia PDF Downloads 2753313 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment
Authors: Atma Sahu
Abstract:
After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems
Procedia PDF Downloads 953312 Cognitive Approach at the Epicenter of Creative Accounting in Cameroonian Companies: The Relevance of the Psycho-Sociological Approach and the Theory of Cognitive Dissonance
Authors: Romuald Temomo Wamba, Robert Wanda
Abstract:
The issue of creative accounting in the psychological and sociological framework has been a mixed subject for over 60 years. The objective of this article is to ensure the existence of creative accounting in Cameroonian entities on the one hand and to understand the strategies used by audit agents to detect errors, omissions, irregularities, or inadequacies in the financial state; optimization techniques used by account preparers to strategically bypass texts on the other hand. To achieve this, we conducted an exploratory study using a cognitive approach, and the data analysis was performed by the software 'decision explorer'. The results obtained challenge the authors' cognition (manifest latent and deceptive behavior). The tax inspectors stress that the entities in Cameroon do not derogate from the rules of piloting in the financial statements. Likewise, they claim a change in current income and net income through depreciation, provisions, inventories, and the spreading of charges over long periods. This suggests the suspicion or intention of manipulating the financial statements. As for the techniques, the account preparers manage the accruals at the end of the year as the basis of the practice of creative accounting. Likewise, management accounts are more favorable to results management.Keywords: creative accounting, sociocognitive approach, psychological and sociological approach, cognitive dissonance theory, cognitive mapping
Procedia PDF Downloads 1933311 Post Covid-19 Scenario and Contemporary International Security Challenges
Authors: Rubina Waseem
Abstract:
The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.Keywords: covid-19, global challenges, international politics, international security
Procedia PDF Downloads 1643310 The Development of Wind Energy and Its Social Acceptance: The Role of Income Received by Wind Farm Owners, the Case of Galicia, Northwest Spain
Authors: X. Simon, D. Copena, M. Montero
Abstract:
The last decades have witnessed a significant increase in renewable energy, especially wind energy, to achieve sustainable development. Specialized literature in this field has carried out interesting case studies to extensively analyze both the environmental benefits of this energy and its social acceptance. However, to the best of our knowledge, work to date makes no analysis of the role of private owners of lands with wind potential within a broader territory of strong wind implantation, nor does it estimate their economic incomes relating them to social acceptance. This work fills this gap by focusing on Galicia, territory housing over 4,000 wind turbines and almost 3,400 MW of power. The main difficulty in getting this financial information is that it is classified, not public. We develop methodological techniques (semi- structured interviews and work groups), inserted within the Participatory Research, to overcome this important obstacle. In this manner, the work directly compiles qualitative and quantitative information on the processes as well as the economic results derived from implementing wind energy in Galicia. During the field work, we held 106 semi-structured interviews and 32 workshops with owners of lands occupied by wind farms. The compiled information made it possible to create the socioeconomic database on wind energy in Galicia (SDWEG). This database collects a diversity of quantitative and qualitative information and contains economic information on the income received by the owners of lands occupied by wind farms. In the Galician case, regulatory framework prevented local participation under the community wind farm formula. The possibility of local participation in the new energy model narrowed down to companies wanting to install a wind farm and demanding land occupation. The economic mechanism of local participation begins here, thus explaining the level of acceptance of wind farms. Land owners can receive significant income given that these payments constitute an important source of economic resources, favor local economic activity, allow rural areas to develop productive dynamism projects and improve the standard of living of rural inhabitants. This work estimates that land owners in Galicia perceive about 10 million euros per year in total wind revenues. This represents between 1% and 2% of total wind farm invoicing. On the other hand, relative revenues (Euros per MW), far from the amounts reached in other spaces, show enormous payment variability. This signals the absence of a regulated market, the predominance of partial agreements, and the existence of asymmetric positions between owners and developers. Sustainable development requires the replacement of conventional technologies by low environmental impact technologies, especially those that emit less CO₂. However, this new paradigm also requires rural owners to participate in the income derived from the structural transformation processes linked to sustainable development. This paper demonstrates that regulatory framework may contribute to increasing sustainable technologies with high social acceptance without relevant local economic participation.Keywords: regulatory framework, social acceptance, sustainable development, wind energy, wind income for landowners
Procedia PDF Downloads 1423309 Income and Factor Analysis of Small Scale Broiler Production in Imo State, Nigeria
Authors: Ubon Asuquo Essien, Okwudili Bismark Ibeagwa, Daberechi Peace Ubabuko
Abstract:
The Broiler Poultry subsector is dominated by small scale production with low aggregate output. The high cost of inputs currently experienced in Nigeria tends to aggravate the situation; hence many broiler farmers struggle to break-even. This study was designed to examine income and input factors in small scale deep liter broiler production in Imo state, Nigeria. Specifically, the study examined; socio-economic characteristics of small scale deep liter broiler producing Poultry farmers; estimate cost and returns of broiler production in the area; analyze input factors in broiler production in the area and examined marketability, age and profitability of the enterprise. A multi-stage sampling technique was adopted in selecting 60 small scale broiler farmers who use deep liter system from 6 communities through the use of structured questionnaire. The socioeconomic characteristics of the broiler farmers and the profitability/ marketability age of the birds were described using descriptive statistical tools such as frequencies, means and percentages. Gross margin analysis was used to analyze the cost and returns to broiler production, while Cobb Douglas production function was employed to analyze input factors in broiler production. The result of the study revealed that the cost of feed (P<0.1), deep liter material (P<0.05) and medication (P<0.05) had a significant positive relationship with the gross return of broiler farmers in the study area, while cost of labour, fuel and day old chicks were not significant. Furthermore, Gross profit margin of the farmers who market their broiler at the 8th week of rearing was 80.7%; and 78.7% and 60.8% for farmers who market at the 10th week and 12th week of rearing, respectively. The business is, therefore, profitable but at varying degree. Government and Development partners should make deliberate efforts to curb the current rise in the prices of poultry feeds, drugs and timber materials used as bedding so as to widen the profit margin and encourage more farmers to go into the business. The farmers equally need more technical assistance from extension agents with regards to timely and profitable marketing.Keywords: broilers, factor analysis, income, small scale
Procedia PDF Downloads 803308 Examining Ethiopian Banking Industry in Relation to Factors Affecting Profitability: From 2008 to 2012
Authors: Zelalem Zerihun
Abstract:
In this study, attempts were made to assess the bank-specific, industry-specific, and macro-economic factors affecting bank profitability. Data were collected from ten commercial banks in Ethiopia, covering the period of 2008-2012. A mixed method research approach was adopted for this research. Documentary analysis and in-depth interview were also used to substantiate the data. The study found out that capital strength, income diversification, bank size and gross domestic product are statistically significant and they have a positive relationship with banks’ profitability. However, operational efficiency and asset quality have a negative relationship with banks’ profitability. The relationship for liquidity risk, concentration and inflation were found to be statistically insignificant. The study revealed that focusing and reengineering the banks in light of the key internal drivers could enhance the profitability as well as the performance of the commercial banks in Ethiopia. In addition to this, the study suggests that banks in Ethiopia should not only be concerned about internal structures but also they must consider both the internal environment and the macro-economic environment in designing strategies to improve their profit or their performance.Keywords: Ethiopian banking industry, macro-economic factors, documentary analysis, capital strength, income diversification
Procedia PDF Downloads 3413307 Determination of Complexity Level in Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 3443306 Impact of Violence against Women on Small and Medium Enterprises (SMEs) in Rural Sindh: A Case Study of Kandhkot
Authors: Mohammad Shoaib Khan, Abdul Sattar Bahalkani
Abstract:
This research investigates the violence and their impact on SMEs in Sindh. The main objective of current research is to examine the women empowerment through women participation in small and medium enterprises in upper Sindh. The data were collected from 500 respondents from Kandhkot District, by using simple random technique. A structural questionnaire was designed as an instrument for measuring the impact of SMEs business in women empowerment in rural Sindh. It was revealed that the rural women is less confident and their husbands were always given them hard time once they are exposing themselves to outside the boundaries of the house. It was revealed that rural women have a major contribution in social, economic, and political development. It was further revealed that women are getting low wages and due to non-availability of market facility they are paying low wages. The negative impact of husbands’ income and having children at the age of 0-6 years old are also significant. High income of other household member raises the reservation wage of mothers, thus lowers the probability of participation when the objective of working is to help family’s financial need. The impact of childcare on mothers’ labor force participation is significant but not as the theory predicted. The probability of participation in labor force is significantly higher for women who lived in the urban areas where job opportunities are greater compared to the rural.Keywords: empowerment, violence against women, SMEs, rural
Procedia PDF Downloads 331