Search results for: national security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6871

Search results for: national security

5821 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 756
5820 Effects of National Policy on Montana Medicaid Coverage and Enrollment

Authors: Ryan J. Trefethen, Vincent H. Smith

Abstract:

This study explores the relationship between national spending on the Medicaid program, and total Medicaid spending and enrollment in Montana, a state that ranks thirty-third in per capita income and thirty-seventh in median household income in the United States. The purpose of the research is to estimate the potential effects that specific changes to national healthcare policy would likely have on funding for the Montana Medicaid Program and enrollees in the program, members of families in poverty whose incomes are low, even though in many cases they have steady jobs. A particular concern is the effect on access to care for children in poverty who tend to be food insecure and, therefore, especially in need of access to health care. The research uses data collected from a variety of government publications, including the Medicaid Financial Management Report, the Medicaid Managed Care Enrollment Report, and the Centers for Medicare and Medicaid Services MSIS State Summaries for fiscal years 2000-2015. These data were examined using econometric analysis, to assess these impacts. The evidence indicates that the changes included in recent congressional legislative initiatives would potentially leave an additional 50,000 to 60,000 Montana residents, five to six percent of the state’s population, in poverty without access to health care. Impacts on children in poverty would potentially be substantial.

Keywords: children, healthcare, medicaid, montana, poverty

Procedia PDF Downloads 254
5819 The Food Security and Nutritional Diversity Impacts of Coupling Rural Infrastructure and Value Chain Development: Evidence from a Generalized Propensity Score Analysis

Authors: Latif Apaassongo Ibrahim, Owusu-Addo Ebenezer, Isaac Bonuedo

Abstract:

Structural barriers - including inadequate infrastructure, poor market linkages, and limited access to financial and extension services - have been the major constraints to improved welfare in the semi-arid regions of Ghana; food insecurity and malnutrition are persistent. The effects of infrastructural improvements as countermeasures are often misdirected by confounding effects of other economic, social, and environmental variables. This study applies Directed Acyclic Graphs (DAGs) to map the causal pathways between infrastructure development and household welfare, identifying key mediators and confounders for one such initiative in Ghana. Then, using Generalized Propensity Score (GPS) and Doubly Robust Estimation (IPWRA), this study evaluates the differential roles of government-supported infrastructure improvements in access and intensity of commercial relative to public infrastructure, on household food security and women’s nutritional diversity given three major value-chain improvements. The main findings suggest that these infrastructure improvements positively impact food security and nutrition, with women’s empowerment and nutritional education acting as key mediators. Market access emerged as a stronger causal mechanism relative to productivity gains in linking infrastructure to improved welfare. Membership in Farmer-Based Organizations (FBOs) and participation in agribusiness linkages further amplified these impacts. However, the effects of infrastructure improvements were less clear when combined with the adoption of climate resilience practices, suggesting potential trade-offs.

Keywords: food security, nutrition, infrastructure, market access, women's empowerment, farmer-based organizations, climate resilience, Ghana

Procedia PDF Downloads 11
5818 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study

Authors: Ayelet Gur

Abstract:

Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.

Keywords: disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities

Procedia PDF Downloads 155
5817 Mining in Nigeria and Development Effort of Metallurgical Technologies at National Metallurgical Development Center Jos, Plateau State-Nigeria

Authors: Linus O. Asuquo

Abstract:

Mining in Nigeria and development effort of metallurgical technologies at National Metallurgical Development Centre Jos has been addressed in this paper. The paper has looked at the history of mining in Nigeria, the impact of mining on social and industrial development, and the contribution of the mining sector to Nigeria’s Gross Domestic Product (GDP). The paper clearly stated that Nigeria’s mining sector only contributes 0.5% to the nation’s GDP unlike Botswana that the mining sector contributes 38% to the nation’s GDP. Nigeria Bureau of Statistics has it on record that Nigeria has about 44 solid minerals awaiting to be exploited. Clearly highlighted by this paper is the abundant potentials that exist in the mining sector for investment. The paper made an exposition on the extensive efforts made at National Metallurgical Development Center (NMDC) to develop metallurgical technologies in various areas of the metals sector; like mineral processing, foundry development, nonferrous metals extraction, materials testing, lime calcination, ANO (Trade name for powder lubricant) wire drawing lubricant, refractories and many others. The paper went ahead to draw a conclusion that there is a need to develop the mining sector in Nigeria and to give a sustainable support to the efforts currently made at NMDC to develop metallurgical technologies which are capable of transforming the metals sector in Nigeria, which will lead to industrialization. Finally the paper made some recommendations which traverse the topic for the best expectation.

Keywords: mining, minerals, technologies, value addition

Procedia PDF Downloads 103
5816 Rohingya Refugees and Bangladesh: Balance of Human Rights and Rationalization

Authors: Kudrat-E-Khuda Babu

Abstract:

Rohingya refugees are the most marginalized and persecuted section of people in the world. The heinous brutality of Myanmar has forced the Muslim minority community to flee themselves to their neighboring country, Bangladesh for quite a few times now. The recent atrocity of the Buddhist country has added insult to injury on the existing crisis. In lieu of protection, the rights of the Rohingya community in Myanmar are being violated through exclusion from citizenship and steamroller of persecution. The mass influx of Rohingya refugees to Bangladesh basically took place in 1978, 1992, 2012, and 2017. At present, there are around one million Rohingyas staying at Teknaf, Ukhiya of Cox’s Bazar, the southern part of Bangladesh. The country, despite being a poverty-stricken one, has shown unprecedented generosity in sheltering the Rohingya people. For sheltering half of the total refugees in 2017, the Prime Minister of Bangladesh, Sheikh Hasina is now being regarded as the lighthouse of humanity or the mother of humanity. Though Bangladesh is not a ratifying state of the UN Refugee Convention, 1951 and its Additional Protocol, 1967, the country cannot escape its obligation under international human rights jurisprudence. Bangladesh is a party to eight human rights instruments out of nine core instruments, and thus, the country has an indirect obligation to protect and promote the rights of the refugees. Pressure from international bodies has also made Bangladesh bound to provide refuge to Rohingya people. Even though the demographic vulnerability and socio-economic condition of the country do not suggest taking over extra responsibility, the principle of non-refoulment as a part of customary international law reminds us to stay beside those persecuted or believed to have well-founded fear of persecution. In the case of HM Ershad v. Bangladesh and Others, 7 BLC (AD) 67, it was held that any international treaty or document after signing or ratification is not directly enforceable unless and until the parliament enacts a similar statute howsoever sweet the document is. As per Article 33(2) of the 1951 Refugee Convention, there are even exceptions for a state party in case of serious consequences like threat to national security, apprehension of serious crime and danger to safeguard state population. Bangladesh is now at a cross-road of human rights and national interest. The world community should come forward to resolve the crisis of the persecuted Rohingya people through repatriation, resettlement, and reintegration.

Keywords: Rohingya refugees, human rights, Bangladesh, Myanmar

Procedia PDF Downloads 188
5815 Fracking the UK's Shale Gas Regulatory Regime

Authors: Yanal Abul Failat

Abstract:

The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.

Keywords: shale gas, UK, legal, oil and gas, energy

Procedia PDF Downloads 711
5814 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations

Authors: Sadiq Nasir

Abstract:

The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.

Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security

Procedia PDF Downloads 87
5813 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review

Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani

Abstract:

Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.

Keywords: cost, mobility, reliability, speed, security, wired, wireless

Procedia PDF Downloads 470
5812 Environmental Degradation of Natural Resources in Broghil National Park in the High Mountains of Pakistan – Empirical Evidence From Local Community and Geoinformatics

Authors: Siddique Ullah Baig, Alisha Manzoor

Abstract:

The remotest, mountainous, and icy Broghil Valley is a high-profile protected area as a national park, which hosts one of the highest altitude permanent human settlements on the earth. This park hosts a distributed but diverse range of habitats. Due to a lack of infrastructures, higher altitudes, and harsh environmental conditions, poverty-stricken inhabitants mostly rely on its resources, causing ecological dis-balance. This study aims to investigate the environmental degradation of natural resources of the park based on empirical evidence from stakeholders and geoinformatics. The result shows that one-fourth of the park is a gently undulating basin dotted with water bodies / grass, and agricultural land and three fourth is entirely rugged with steep mountains and glaciers. There are virtually no forests as the arid cold tundra climate and high altitude prevent tree growth. Rapid three-decadal land cover changes have led to ecological disequilibrium of the park, narrowing the traditional diverse food base, decreasing the resilience of biodiversity and local livelihoods as crop-land has shifted towards fallow, alpine-grass to peat-land and snow/glacial ice area to bare-soil/rocks. The local community believes in exploiting whatever vegetation or organic material is available for use as food, fodder, and fuel. The permanent presence of the community and limited cost-effective options in the park will be a challenge forever to maintain undisturbed natural processes as the objective of a national park.

Keywords: Broghil National Park, natural resources, environmental degradation, land cover

Procedia PDF Downloads 67
5811 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 125
5810 Applying Audience Development Programs in Museums for Raising Community Awareness towards Cultural Heritage Preservation: A Case Study of Alexandria National Museum

Authors: Samar F. Elkasrawy

Abstract:

Museums play a significant role in their communities with respect to culture, history, environment, and social development. They are considered as important sites for families, tourists, school groups, cultural visitors and individuals, looking to enjoy, learn and expand their horizons. Aim of audience development programs is to support individuals and organizations to work together to deliver messages that will raise museums' profile for both existing and potential visitors. They recognize the particular role that museums play for communities, the audiences they seek to reach, the experience they seek to offer and the extent and nature of their collections. This study aims at using both the qualitative and quantitative approach to explore the important role that audience development programs in museums can play in raising awareness in their communities concerning cultural heritage preservation and tourism. The Alexandria National Museum is considered as a valuable case study. In depth interviews with museum managers and staff was conducted as well as an online questionnaire. The study also includes suggestions and guidelines for applying audience development programs in Egyptian museums.

Keywords: Alexandria National Museum, audience development programs, cultural heritage, tourism and preservation awareness

Procedia PDF Downloads 263
5809 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 98
5808 Improving Short-Term Forecast of Solar Irradiance

Authors: Kwa-Sur Tam, Byung O. Kang

Abstract:

By using different ranges of daily sky clearness index defined in this paper, any day can be classified as a clear sky day, a partly cloudy day or a cloudy day. This paper demonstrates how short-term forecasting of solar irradiation can be improved by taking into consideration the type of day so defined. The source of day type dependency has been identified. Forecasting methods that take into consideration of day type have been developed and their efficacy have been established. While all methods that implement some form of adjustment to the cloud cover forecast provided by the U.S. National Weather Service provide accuracy improvement, methods that incorporate day type dependency provides even further improvement in forecast accuracy.

Keywords: day types, forecast methods, National Weather Service, sky cover, solar energy

Procedia PDF Downloads 466
5807 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict

Authors: Christopher Holroyd

Abstract:

With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.

Keywords: human trafficking, reconstruction, security, terrorism

Procedia PDF Downloads 132
5806 National Plans for Recovery and Resilience between National Recovery and EU Cohesion Objectives: Insights from European Countries

Authors: Arbolino Roberta, Boffardi Raffaele

Abstract:

Achieving the highest effectiveness for the National Plans for Recovery and Resilience (NPRR) while strengthening the objectives of cohesion and reduction of intra-EU unbalances is only possible by means of strategic, coordinated, and coherent policy planning. Therefore, the present research aims at assessing and quantifying the potential impact of NPRRs across the twenty-seven European Member States in terms of economic convergence, considering disaggregated data on industrial, construction, and service sectors. The first step of the research involves a performance analysis of the main macroeconomic indicators describing the trends of twenty-seven EU economies before the pandemic outbreak. Subsequently, in order to define the potential effect of the resources allocated, we perform an impact analysis of previous similar EU investment policies, estimating national-level sectoral elasticity associated with the expenditure of the 2007-2013 and 2014-2020 Cohesion programmes funds. These coefficients are then exploited to construct adjustment scenarios. Finally, convergence analysis is performed on the data used for constructing scenarios in order to understand whether the expenditure of funds might be useful to foster economic convergence besides driving recovery. The results of our analysis show that the allocation of resources largely mirrors the aims of the policy framework underlying the NPRR, thus reporting the largest investments in both those sectors most affected by the economic shock (services) and those considered fundamental for the digital and green transition. Notwithstanding an overall positive effect, large differences exist among European countries, while no convergence process seems to be activated or fostered by these interventions.

Keywords: NPRR, policy evaluation, cohesion policy, scenario Nalsysi

Procedia PDF Downloads 83
5805 The Role of Ecotourism Development in the Financing of Conservation Initiatives in Cameroon’s Protected Areas: Lessons from the Campo Ma’an National Park

Authors: Nyong Princely Awazi, Gadinga Walter Forje, Barnabas Neba Nfornkah, Ndzifon Jude Kimengsi

Abstract:

Ecotourism is documented as a sustainable measure of bridging conservation goals and livelihood sustenance around protected areas, due to its ability of not just providing alternative livelihood, but also in providing the necessary resources that can help finance conservation initiatives. In Cameroon, all ecotourism activities around national parks are aimed at generating revenue through the conservation service while providing sustainable livelihood options to the local population. There exists an information lacuna regarding the contribution of ecotourism finances to conservation efforts in the country. This study was aimed at establishing the contribution of ecotourism finances to conservation initiatives in and around the Campo Ma’an National Park (CMNP). Data were collected through the administering of 120 structured questionnaires to ecotourism actors and 15 key/expert interviews with tourism and conservation actors in the Campo Ma’an landscape. Chi-square test, Spearman’s rank correlation and regressions were used for data analysis. The study revealed that the main sources of ecotourism financing to the park service are through entrance fees, cameras and vehicle fees paid by tourists as well as ecotourism project financing through NGOs. Calculations from the tourism register of the park showed that the park was able to raise as much as 1,576,000 FCFA (US$ 3,152) annually. It was further established that ecotourism revenue has not greatly supported conservation, with 54% of respondents perceiving ecotourism not contributing to biodiversity conservation. Chi Square test results highlighted poor ecotourism governance, low level of ecotourism development, corruption from park management staff, obsolete nature of the current finance law on the management of protected area revenue as key factors hindering ecotourism financing in conservation. For ecotourism financing to contribute to biodiversity conservation in the CMNP and in Cameroon’s protected areas, the government needs to revise the finance law on the management of revenue generated from protected areas, improve park governance to fight corruption and enhance transparency, invest in the development and marketing of the Campo Ma’an national park as a tourism destination in the country.

Keywords: Cameroon, Campo Ma’an National Park, conservation, ecotourism, ecotourism financing

Procedia PDF Downloads 111
5804 Homosexuality in Burundi and Homosexuals Rights

Authors: Ciza Didier

Abstract:

By definition, homosexuality designates the sexual or amorous attraction towards a person of the same sex or of the same gender as one's own. The Burundi country has superficially 27834km2 with 13 millions of population. There are groups of certain people assuming that they are homosexual and that they want to claim their rights. Burundian homosexuals often organise seminars in the premises of the National Health Security Agency (NHSA) located at Kigobe quarter, in Bujumbura, this is the place where they meet to try to exchange and create their association for claim their rights. There are 2 categories of homosexuals: - gays: homosexuality between men (male sex) - lesbians: homosexuality between women (female sex) In the gay couple, there is one who behaves like a woman and often wears feminine styles while the other always remains like a man and always wears masculine styles. In the lesbian couple, there is one who behaves like a man and wears men's styles while the other remains as she is like a woman. In general, Burundian society is against homosexuality. Our society sees them as pariahs carrying a curse. According to Burundian culture and customs, homosexuality is satanic, therefore it is a great sin. In April 2011, Burundian President Pierre Nkurunziza signed a law criminalizing homosexual acts and providing for a sentence of three months to two years in prison, as well as a fine of BIF 50,000 to BIF 100,000 for any homosexual behavior. The investigation recently done shows that out of 300 people questioned, 299 were against homosexuality saying that it is against Burundian culture and 1 was for homosexuality. All Burundians are not against homosexuality. Their country must therefore take into consideration the small party of people who are for homosexuality. Homosexuals, too, need to live like others.

Keywords: homosexuality, lesbian, gay, law

Procedia PDF Downloads 71
5803 The Philosophy of Language Theory in the Standard Malay Primary School Curriculum in Malaysia

Authors: Mohd Rashid Bin Hj. Md Idris, Lajiman Bin Janoory, Abdullah Bin Yusof, Mahzir Bin Ibrahim

Abstract:

The Malay language curriculum at primary school level in Malaysia is instrumental in ensuring the status of the language as the official and national language, the language of instruction as well as the language that unites the various ethnics in Malaysia. A research addressing issues related to the curriculum standard is, therefore, essential to provide value added quality to the existing National Education Philosophy in ongoing efforts to produce an individual who is balanced in intellectual, spiritual, emotional and physical developments. The objective of this study is to examine the Philosophy of Language Theory, to review the content of the Malay language subject in relation to the Standard Curriculum for Primary Schools (KSSR), and to identify aspects of Theory of Philosophy in the Standard Curriculum for Primary Schools. The Malay language Primary School Curriculum is designed to enable students to be competent speakers and communicators of the language in order to gain knowledge, skills, information, values, and ideas and to enhance skills in social relations. Therefore, this study is designed to help educators to achieve all the stated goals. At the same time students at primary school level are expected to be able to apply the principle of language perfection as stated in the Philosophy of Language Theory to enable them to understand, appreciate and to take pride in being a Malaysian who speaks the language well.

Keywords: language, philosophy, theory, curriculum, standard, national education philosophy

Procedia PDF Downloads 594
5802 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 315
5801 Analysis of Energy Planning and Optimization with Microgrid System in Dawei Region

Authors: Hninn Thiri Naing

Abstract:

In Myanmar, there are many regions that are far away from the national grid. For these areas, isolated regional micro-grids are one of the solutions. The study area in this paper is also operating in such way. The main difficulty in such regions is the high cost of electrical energy. This paper will be approached to cost-effective or cost-optimization by energy planning with renewable energy resources and natural gas. Micro-grid will be set up for performance in the Dawei region since it is economic zone in lower Myanmar and so far from national grids. The required metrological and geographical data collections are done. Currently, the status is electric unit rate is higher than the other. For microgrid planning and optimization, Homer Pro-software is employed in this research.

Keywords: energy planning, renewable energy, homer pro, cost of energy

Procedia PDF Downloads 129
5800 On the Allopatry of National College Entrance Exam in China: The Root, Policy and Strategy

Authors: Shi Zhang

Abstract:

This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered. 

Keywords: college entrance examination, higher education, education policy, education equality

Procedia PDF Downloads 377
5799 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 262
5798 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 222
5797 Reform of the Intellectual Property Administrative System and High-Quality Innovation of Enterprises

Authors: Prof. Hao Mao, Phd Qia Wei, Dr.Siwei Cao

Abstract:

The administrative system is the organisational carrier for managing the operation of the market and the basic guarantee for achieving innovation incentives. This paper takes the reform of provincial administrative institutions in the process of Chinese national intellectual property administrative system reform in 2018 as a quasi-natural experiment to assess the impact of IP administrative system reform on enterprise innovation. The study finds that reducing the independence of some provincial administrative institutions will lead to a reduction in the number of local enterprises' innovations and a decrease in the quality of innovations, which is mainly triggered by a decrease in R&D investment due to a decrease in the strength of subsidy policies. The new round of intellectual property administrative system reform in 2023 elevated the administrative status of China National Intellectual Property Administration (CNIPA), and re-strengthened the top-level design and centralization of IP administration. This paper clarifies the role of the 2018 IP administrative system reform on China's market innovation, provides empirical evidence for the properly handling government market relations and property rights incentives and other institutional designs, and also provides empirical references for further promoting the improvement of national and local IP institutional mechanisms and the implementation of the innovation-driven development strategy in the new round of reform.

Keywords: intellectual property, administrative systems, reform, high-quality innovation

Procedia PDF Downloads 38
5796 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 320
5795 “Waving High the Delicate Mistress”: on Feminist Geography and American Identity in the Valley of the Moon

Authors: Yangyang Zhang

Abstract:

In The Valley of the Moon, Jack London implicitly presents the connection between the city and the male, the country and the female, constructing a gender space where the city and the countryside are opposed. But meanwhile, London is constantly dismantling the gender space through the reversed travel map so as to highlight the fluidity and productivity of female space. Under such circumstance, the original gender space has to be reorganized. Through the construction of gendered urban and rural spaces, Jack London presents the national crisis in the process of urbanization of the American West in the late 19th century, while the female-led reversed travel map reproduces the original contribution of the American West to the construction of nationality. In the end, the reorganized neutral space “valley of the moon” reflects the “garden” motif in American national imagination and plays an important role in rebuilding national identity. This research studies the feminist geography and cartography in Jack London's novel The Valley of the Moon and analyzes the gender-politics attribution in the literary geography writing in London's novel on this basis. The research returns to the American historical context at the end of the 19th century, focusing on how London’s feminist geography embodies his sense of nationality and investigating how female-dominated literary cartography reconstructs American identity. This paper takes Literary Cartography, and feminist geography as the ideological guide combines with the discourse of gender politics. comprehensively uses various literary criticism methods such as deconstructionist literary criticism, and new historicism literary criticism, etc., Through the study of Jack London's work, the paper aims to analyse how London constructs a national image by literary geography.

Keywords: American identity, American west, feminist geography, garden motif, the valley of the moon

Procedia PDF Downloads 126
5794 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 165
5793 European Project Meter Matters in Sports: Fostering Criteria for Inclusion through Sport

Authors: Maria Campos, Alain Massart, Hugo Sarmento

Abstract:

The Meter Matters Erasmus Sport European Project (ID: 101050372) explores the field of social inclusion in and through sports with the aim of a) proposing appropriate criteria for co-funding sports programs involving people with intellectual and developmental disabilities and other more vulnerable people, primarily in mainstream sports organizations and b) proposing a model for co-funding social inclusion in and through sports at the national level. This European project (2022-2024) involves 6 partners from 3 countries: Univerza V Ljubljani – coordinator and Drustvo Specialna Olimpiada Slovenije (Slovenia); Magyar Specialis Olimpia Szovetseg and Magyar Testnevelesi Es Sporttudomanyi Egyetem (Hungary) and APPDA Coimbra - Associação Portuguesa para as Perturbações do Desenvolvimento e Autismo and Universidade De Coimbra, Faculty of Sport Sciences and Physical Education (Portugal). Equal involvement of all people in sports activities is, in terms of national and international guidelines, enshrined in some conventions and strategies in the field of sports, as well as human rights, social security, physical and mental health, architecture, environment and public administration. However, there is a gap between the practice and EU guidelines in terms of sustainable support for socially inclusive sports programs in the form of co-funding by state and local (municipal) resources. We observe considerable opacity in the regulation of the field. Given that there are both relevant programs and inclusive legislation and policies, we believe that the reason for the missing article is reflected in the undeveloped criteria for measuring social inclusion in sports. Major sports programs are usually co-funded based on crowds (number of involved athletes) and performance (sports score). In the field of social inclusion in sports, the criteria cannot be the same, as it is a smaller population. Therefore, the goals of inclusion in sports should not be the focused on competitive results but on opening equal opportunities for all, regardless of their psychophysical abilities. In the Meter Matters program, we are searching for criteria for co-funding social inclusion in sports through focus groups with coaches, social workers, psychologists and others professionals involved in inclusive sports programs in regular sports clubs and with athletes and their parents or guardians. Moreover, experts in the field of social inclusion in sports were also interviewed. Based on the proposals for measuring social inclusion in sports, we developed a model for co-funding socially inclusive sports programs.

Keywords: European project, meter matters, inclusion, sport

Procedia PDF Downloads 111
5792 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 76