Search results for: public order and security act
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20567

Search results for: public order and security act

19517 Indoor and Outdoor Forest Farming for Year-Round Food and Medicine Production, Carbon Sequestration, Soil-Building, and Climate Change Mitigation

Authors: Jerome Osentowski

Abstract:

The objective at Central Rocky Mountain Permaculture Institute has been to put in practice a sustainable way of life while growing food, medicine, and providing education. This has been done by applying methods of farming such as agroforestry, forest farming, and perennial polycultures. These methods have been found to be regenerative to the environment through carbon sequestration, soil-building, climate change mitigation, and the provision of food security. After 30 years of implementing carbon farming methods, the results are agro-diversity, self-sustaining systems, and a consistent provision of food and medicine. These results are exhibited through polyculture plantings in an outdoor forest garden spanning roughly an acre containing about 200 varieties of fruits, nuts, nitrogen-fixing trees, and medicinal herbs, and two indoor forest garden greenhouses (one Mediterranean and one Tropical) containing about 50 varieties of tropical fruits, beans, herbaceous plants and more. While the climate zone outside the greenhouse is 6, the tropical forest garden greenhouse retains an indoor climate zone of 11 with near-net-zero energy consumption through the use of a climate battery, allowing the greenhouse to serve as a year-round food producer. The effort to source food from the forest gardens is minimal compared to annual crop production. The findings at Central Rocky Mountain Permaculture Institute conclude that agroecological methods are not only beneficial but necessary in order to revive and regenerate the environment and food security.

Keywords: agroecology, agroforestry, carbon farming, carbon sequestration, climate battery, food security, forest farming, forest garden, greenhouse, near-net-zero, perennial polycultures

Procedia PDF Downloads 444
19516 Dimensions of Public Spaces in Indian Market Places Feelings through Human Senses

Authors: Piyush Hajela

Abstract:

Public spaces in Indian market places are vibrant, colorful and carry latent dimensions that make them attractive and popular gathering spaces. These markets satisfy the household needs of the people and also their social, cultural and traditional aspirations. Going to a market place for shopping in India is a great source of entertainment for the people. They would love to spend as much time as possible and stay for longer durations than otherwise required. It is this desire of the people that generates public spaces. Much of these public spaces emerge as squares, plazas, corners of varied shapes and sizes at different locations, and yet provide a conducive environment. Such public spaces grow organically and are discovered by the people themselves. Indian markets serve people of different culture, religion, caste, age, gender which keeps them alive all the year round. Indian is a diverse country and this diversity is reflected clearly in the market places. They hold the people together and promote harmony across cultures. Free access to these market places makes them magnets for social interaction. Public spaces are spread across a city and more or less have established their existence and prominence in a social set up. While few of them are created, others are discovered by the people themselves in their constant search for desirable interactive public spaces. These are the most sought after gathering spaces that have the quality of promoting social interaction, providing free accessibility, provide desirable scale etc. The paper aims at identifying these freely accessible public spaces and the dimensions within it that make these public spaces hold the people for significant duration of time. The dimensions present shall be judged through collective response of human senses in form of safety, comfort and so on through the expressions of the participants. The aim therefore would be to trace the freely accessible public spaces emerged in Indian markets and evaluate them for human response and behavior. The hierarchy of market places in the city of Bhopal is well established as, city center level, sub city-center level, community level, local and convenient level market places. While many city-centers are still referred to as the old or traditional or the core area of the city, the others are part of the planned city. These different levels of market places are studied for emerged public spaces. These emerged public spaces are then documented in detail for unveiling the dimensions they offer through, photographs, visual observations, questionnaires and response of the participants of these public spaces.

Keywords: human comfort, enclosure, safety, social interaction

Procedia PDF Downloads 418
19515 Involvement of Community Pharmacists in Public Health Services in Asir Region, Saudi Arabia: A Cross-Sectional Study

Authors: Mona Almanasef, Dalia Almaghaslah, Geetha Kandasamy, Rajalakshimi Vasudevan, Sadia Batool

Abstract:

Background: Community pharmacists are one of the most accessible healthcare practitioners worldwide and their services are used by a large proportion of the population. Expanding the roles of community pharmacists could contribute to reducing pressure on general health practice and other areas of health services. This research aimed to evaluate the contribution of community pharmacists in the provision of public health services and to investigate the perceived barriers to the provision of these services in Saudi Arabia. Materials and Methods: This study followed a cross-sectional design using an online anonymous self-administered questionnaire. The study took place in the Asir region, Saudi Arabia, between September 2019 and February 2020. A convenience sampling strategy was used to select and recruit the study participants. The questionnaire was adapted from previous research and involved three sections: demographics, involvement in public health services and barriers to practicing public health roles. Results: The total number of respondents was 193. The proportion of respondents who reported that they were “very involved” or “involved” in each service was 61.7% for weight management, 60.6% for sexual health, 57.5% for healthy eating, 53.4% for physical activity promotion, 51.3% for dental health, 46.1% for smoking cessation, 39.4% for screening for diabetes, 35.7% for screening for hypertension, 31.1% for alcohol dependence and drug misuse counseling, 30.6% for screening for dyslipidaemia, and 21.8% for vaccination and immunization. Most of the barriers in the current research were rated as having low relevance to the provision of public health services. Conclusion: Findings in the current research suggest that community pharmacists in the Asir region have varying levels of involvement in public health roles. Further research needs to be undertaken to understand the barriers to the provision of public health services and what strategies would be beneficial for enhancing the public health role of community pharmacists in Saudi Arabia.

Keywords: community pharmacist, public health, Asir region, Saudi Arabia

Procedia PDF Downloads 105
19514 Averting Food Crisis in Nigeria and Beyond, Activities of the National Food Security Programme

Authors: Musa M. Umar, S. G. Ado

Abstract:

The paper examines the activities of the National Programme for food security (NPFS) for averting food insecurity in Nigeria and beyond. The components of the NPFS include site development, outreach, community development and management support. On each site, core activities comprise crop productivity, production diversification and agro-processing. The outreach activities consist of inputs and commodity marketing, rural finance, strengthening research-extension-farmers-inputs linkages, health and nutrition and expansion of site activities. The community development activities include small-scale rural infrastructure, micro-earth dams and community forestry. The overall benefits include food security, improved productivity, marketing and processing, enhanced land and water use, increased animal production and fish catches, improved nutrition, reduction in post-harvest losses and value addition, improved rural infrastructure and diversification of production leading to improved livelihood. The NPFS would poster sustained development of small-holder agricultural and income generation.

Keywords: food-security, community development, post-harvest, production

Procedia PDF Downloads 358
19513 Measuring Regional Inequality: The Italian Case

Authors: Arbolino R., Boffardi R., L. De Simone

Abstract:

The success of a development policy requires the definition of a proper investment planning on behalf of policymakers. Such planning should consider both tangible and intangible features characterizing a territory and, moreover, evaluate both state of place and an ideal situation to be achieved, that represents the final goal of the policy. The aim of this research is to propose a methodological approach to implement this ideal solution or the best solution appliable to the Italian regions. It consists of two steps: the first one is a measure of regional inequality through building a composite indicator for analyzing the level of development and compare the differences among the regions. It is constructed by means of a principal component analysis. Ranking regions according to the scores achieved is useful as benchmark, to identify a best solution towards which other regions should strive. Thus, this distance is measured through a revised Sen index that allows to assign a weight on which calculate the financing resource programming. The results show that this approach is a good instrument to fairly and efficiently allocate public funds, in order to reduce regional inequalities.

Keywords: public economics, inequalities, growth, development

Procedia PDF Downloads 72
19512 Overview of the Public Service Executive Training System in Hungary

Authors: Csilla Paksi-Petró

Abstract:

The Hungarian national public administration training system providing continuous, lifelong further training to some ten thousand executives in public administration was launched in 2014, adding skills and competency development to the previous training solutions, which had a mainly legal and professional approach. The executive training system is being continuously developed since tackling the existing qualitative, and quantitative challenges calls for the introduction of novel, innovative solutions. With a gap-filling character, this study presents, in brief, the last eight years of system of executive training in public administration, supported by the outcomes of the author's empirical research, makes suggestions for the possible directions of its further development. Through this article, the reader may obtain an overview of the current Hungarian civil service further training system, its institution system, the method of its application, its target groups, its results, and its development prospects. By reading the article, the reader will get acquainted with the good practices of the Hungarian civil service further training system.

Keywords: coaching, e-learning, executive development, further-training

Procedia PDF Downloads 123
19511 Fractional Order Differentiator Using Chebyshev Polynomials

Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh Kumar Pandey

Abstract:

A discrete time fractional orderdifferentiator has been modeled for estimating the fractional order derivatives of contaminated signal. The proposed approach is based on Chebyshev’s polynomials. We use the Riemann-Liouville fractional order derivative definition for designing the fractional order SG differentiator. In first step we calculate the window weight corresponding to the required fractional order. Then signal is convoluted with this calculated window’s weight for finding the fractional order derivatives of signals. Several signals are considered for evaluating the accuracy of the proposed method.

Keywords: fractional order derivative, chebyshev polynomials, signals, S-G differentiator

Procedia PDF Downloads 649
19510 Determinants and Repercussions of International Migration in and Through Libya: Afield Study

Authors: Ihab S. Jweida

Abstract:

Libya is witnessing major shifts in international migration flows resulting frompolitical, economic, social, security and environmental reasons as a result of what it iswitnessing from the elements of a fragile state due to government division, politicalconflicts, security chaos and the spread of terrorist organizations, since the popularuprising in February 2011, which threatens economic, social and security stability andthen The political stability of the Mediterranean basin countries. Therefore, this studycame as a scientific research aimed at analyzing the role of political economy inexplaining international migration with application to the case of Libya during theperiod from 2011-2021. To achieve this objective, the researcher relied on the descriptive approach basedon qualitative and quantitative analysis to analyze studies, reports, and internationalmigration policies in Libya, and conducted an exploratory study based on a personalinterview questionnaire for (670) migrants present in the distribution areas in Libyaand (65) Libyan migrants,

Keywords: international, migration, Libya, case

Procedia PDF Downloads 63
19509 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services

Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt

Abstract:

Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.

Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology

Procedia PDF Downloads 446
19508 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 265
19507 An Equitable Strategy to Amend Zero-Emission Vehicles Incentives for Travelers: A Policy Review

Authors: Marie Louis

Abstract:

Even though many stakeholders are doing their very best to promote public transportation around the world, many areas are still public transportation non-accessible. With travelers purchasing and driving their private vehicles can be considered as a threat to all three aspects of the sustainability (e.g., economical, social, environmental). However, most studies that considered simultaneously all three aspects of the sustainability concept when planning and designing public transportation for a corridor have found tradeoffs among the said three aspects.One of the tradeoffs was identified by looking at tipping points of the travel demands to question whether transit agencies/and or transportation policymakers should either operate smaller buses or provide incentives to purchase Leadership in Energy and Environmental Design (LEED)-Qualified low-emission vehicles or greener vehicles (e.g., hybrid). However, how and when do the department of environmental protection (DEP) and the department of revenue (DOR) figure out how much incentives to give to each traveler who lives in a zoning that is considered as public transportation inaccessible or accessible? To answer this policy question, this study aims to compare the greenhouse gases (GHGs) emissions when hybrid and conventional cars are used to access public transportation stops/stations. Additionally, this study also intends to review previous states that have already adopted low-emissions vehicle (LEVs) or Zero-Emissions Vehicles (ZEVs) to diminish the daily GHGs pollutants.

Keywords: LEED-qualified vehicles, public transit accessibility, hybrid vehicles incentives, sustainability trade-offs

Procedia PDF Downloads 197
19506 The Impact of Civil Disobedience on Tourist and Local Residents in Cameroon: Case Study the North West Region

Authors: Zita Fomukong Andam

Abstract:

Civil disobedience according to John Rawls (1971) is a public nonviolent and conscientious breach of laws undertaken with the aim of bringing about a change in government laws and policies. Thus individuals who engage themselves in such an act are aware and ready to accept the consequences of their actions. Cameroon more precisely the Northwest and the Southwest region which are the English part are considered as one of the societies facing this act of civil disobedience. It has been a tormenting issue in the country affecting its economy and the tourism sector. This is because these regions known as one of the best touristic sites of the country is not more considered as a destination to be visited by tourist because of its insecurities. Many commercial buildings have been burning down, leaving many young Cameroonians jobless. Education has been hindered, and youths are forced to relocate to nearby cities in order to continue their education. This crisis has created a lot of insecurity throughout the regions thus youths now have one common interest to travel abroad either to seek refuge or to continue their education and even search for jobs. The purpose of this research is to assess the issue of civil disobedience, trying to understand why it is affected only by a specific region in a country while the others are doing fine. A deep research discourse was conducted with randomly selected individuals aging between 15 to 40 years living both in the destination and abroad. Survey questionnaires and interviews were carried out as a method to collect data. The results show that this crisis has impacted the local residents psychologically and has injected a lot of fears into tourists and they are no more willing to visit the destination. In addition, it has brought a negative impact on the county’s economy since tourism is considered as the key sector in a country’s economy. On the other hand, the results showed that many local residents have remained jobless, others have lost family members, and the daily routine life has been affected. Understanding these results, the national government and international bodies might be able to propose possible and efficient solutions in order to attain stability and security in this region.

Keywords: civil disobedience, economic impact, local residents, tourist

Procedia PDF Downloads 115
19505 Fundamentals of Performance Management in the World of Public Service Organizations

Authors: Daniella Kucsma

Abstract:

The examination of the Privat Service Organization’s performance evaluation includes several steps that help Public organizations to develop a more efficient system. Public sector organizations have different characteristics than the competitive sector, so it can be stated that other/new elements become more important in their performance processes. The literature in this area is diverse, so highlighting an indicator system can be useful for introducing a system, but it is also worthwhile to measure the specific elements of the organization. In the case of a public service organization, due to the service obligation, it is usually possible to talk about a high number of users, so compliance is more difficult. For the organization, it is an important target to place great emphasis on the increase of service standards and the development of related processes. In this research, the health sector is given a prominent role, as it is a sensitive area where both organizational and individual performance is important for all participants. As a primary step, the content of the strategy is decisive, as this is important for the efficient structure of the process. When designing any system, it is important to review the expectations of the stakeholders, as this is primary when considering the design. The goal of this paper is to build the foundations of a performance management and indexing framework that can help a hospital to provide effective feedback and a direction that is important in assessing and developing a service and can become a management philosophy.

Keywords: health sector, public sector, performance management, strategy

Procedia PDF Downloads 195
19504 Integrated Microsystem for Multiplexed Genosensor Detection of Biowarfare Agents

Authors: Samuel B. Dulay, Sandra Julich, Herbert Tomaso, Ciara K. O'Sullivan

Abstract:

An early, rapid and definite detection for the presence of biowarfare agents, pathogens, viruses and toxins is required in different situations which include civil rescue and security units, homeland security, military operations, public transportation securities such as airports, metro and railway stations due to its harmful effect on the human population. In this work, an electrochemical genosensor array that allows simultaneous detection of different biowarfare agents within an integrated microsystem that provides an easy handling of the technology which combines a microfluidics setup with a multiplexing genosensor array has been developed and optimised for the following targets: Bacillus anthracis, Brucella abortis and melitensis, Bacteriophage lambda, Francisella tularensis, Burkholderia mallei and pseudomallei, Coxiella burnetii, Yersinia pestis, and Bacillus thuringiensis. The electrode array was modified via co-immobilisation of a 1:100 (mol/mol) mixture of a thiolated probe and an oligoethyleneglycol-terminated monopodal thiol. PCR products from these relevant biowarfare agents were detected reproducibly through a sandwich assay format with the target hybridised between a surface immobilised probe into the electrode and a horseradish peroxidase-labelled secondary reporter probe, which provided an enzyme based electrochemical signal. The potential of the designed microsystem for multiplexed genosensor detection and cross-reactivity studies over potential interfering DNA sequences has demonstrated high selectivity using the developed platform producing high-throughput.

Keywords: biowarfare agents, genosensors, multipled detection, microsystem

Procedia PDF Downloads 274
19503 A Comparative Study of School Choice: China and the United States

Authors: Huizi Zeng

Abstract:

This paper delineates the historical retrospective and current status of school choice in China. Focusing on analyzing the similarities and differences in origin, evolution, public dispute, policy dynamics between China and the United States, the article depicts a panorama and explores possible causes. Both China and the United States continue to learn from historical legacy and invent new programs to perfect school choice policy but the outcomes are so different. On the one hand, the percentage of public schools in China remains high all along, while there is a considerably significant reduction in the United States. On the other hand, there is more governmental intervention in the United States with continuous and constant policy updates and adjustment. Finally, this article adopts public-private partnerships (PPP) to seek to provide insights into differences between the two countries and argue that school choice is not only the production of education marketization and corporation but also driven by political mechanism.

Keywords: China, United States, school choice, comparative analysis, policy, public private partnerships

Procedia PDF Downloads 191
19502 Evalutaion of the Surface Water Quality Using the Water Quality Index and Discriminant Analysis Method

Authors: Lazhar Belkhiri, Ammar Tiri, Lotfi Mouni

Abstract:

Water resources present to the public order of the world a very important problem for the protection and management of water quality given the complexity of water quality data sets. In this study, the water quality index (WQI) and irrigation water quality index (IWQI) were calculated in order to evaluate the surface water quality for drinking and irrigation purposes based on nine hydrochemical parameters. In order to separate the variables that are the most responsible for the spatial differentiation, the discriminant analysis (DA) was applied. The results show that the surface water quality for drinking is poor quality and very poor quality based on WQI values, however, the values of IWQI reflect that this water is acceptable for irrigation with a restriction for sensitive plants. Consequently, the discriminant analysis DA method has shown that the following parameters pH, potassium, chloride, sulfate, and bicarbonate are significant discrimination between the different stations with the spatial variation of the surface water quality, therefore, the results obtained in this study provide very useful information to decision-makers

Keywords: surface water quality, drinking and irrigation purposes, water quality index, discriminant analysis

Procedia PDF Downloads 89
19501 Development of E-Tendering Models for Nigerian Public Procuring Entities

Authors: Bello Abdullahi, Kabir Bala, Yahaya M. Ibrahim, Ahmed D. Ibrahim

Abstract:

Public sector tendering has traditionally been conducted using manual paper-based processes which are known to be inefficient, less transparent, and more prone to manipulations and errors. However, the advent of the Internet and its associated technologies has led to the development of numerous e-Tendering systems that addressed many of the problems associated with the manual paper-based tendering system. Currently, in Nigeria, the public tendering processes are largely conducted based on manual paper-based system that is bedevilled by a number of problems such as inordinate delays, inefficiencies, manipulation of the tender evaluation process, corruption, lack of transparency and competition, among other problems. These problems can be addressed through the adoption of existing web-based e-Tendering systems which are known to address most of these problems. However, these existing e-Tendering systems that have been developed are not based on the Nigerian legal procurement processes and as such their suitability for local application is very limited. This paper is part of a larger study that attempt to address this problem through the development of an e-Tendering system that is based on the requirements of the Nigerian public procuring entities. In this paper, the identified tendering processes commonly used by Nigerian public procuring entities in the selection of construction sources are presented. A multi-methods research approach was used to identify those tendering processes. Specifically, 19 existing business use cases used by Nigerian public procuring entities were identified and 61 system use cases were prescribed based on the identified business use cases. The use cases were used as the basis for the development of domain and software conceptual models. The models were successfully used to guide the development of an e-Tendering system called NPS-eTender. Ripple and Unified Process were adopted as the software development methodologies.

Keywords: e-tendering, e-procurement, requirement model, conceptual model, public sector tendering, public procurement

Procedia PDF Downloads 198
19500 Ensuring Sustainable Urban Mobility in Indian Cities: Need for Creating People Friendly Roadside Public Spaces

Authors: Pushplata Garg

Abstract:

Mobility, is an integral part of living and sustainability of urban mobility, is essential not only for, but also for addressing global warming and climate change. However, very little is understood about the obstacles/hurdles and likely challenges in the success of plans for sustainable urban mobility in Indian cities from the public perspective. Whereas some of the problems and issues are common to all cities, others vary considerably with financial status, function, the size of cities and culture of a place. Problems and issues similar in all cities relate to availability, efficiency and safety of public transport, last mile connectivity, universal accessibility, and essential planning and design requirements of pedestrians and cyclists are same. However, certain aspects like the type of means of public transportation, priority for cycling and walking, type of roadside activities, are influenced by the size of the town, average educational and income level of public, financial status of the local authorities, and culture of a place. The extent of public awareness, civic sense, maintenance of public spaces and law enforcement vary significantly from large metropolitan cities to small and medium towns in countries like India. Besides, design requirements for shading, location of public open spaces and sitting areas, street furniture, landscaping also vary depending on the climate of the place. Last mile connectivity plays a major role in success/ effectiveness of public transport system in a city. In addition to the provision of pedestrian footpaths connecting important destinations, sitting spaces and necessary amenities/facilities along footpaths; pedestrian movement to public transit stations is encouraged by the presence of quality roadside public spaces. It is not only the visual attractiveness of streetscape or landscape or the public open spaces along pedestrian movement channels but the activities along that make a street vibrant and attractive. These along with adequate spaces to rest and relax encourage people to walk as is observed in cities with successful public transportation systems. The paper discusses problems and issues of pedestrians for last mile connectivity in the context of Delhi, Chandigarh, Gurgaon, and Roorkee- four Indian cities representing varying urban contexts, that is, of metropolitan, large and small cities.

Keywords: pedestrianisation, roadside public spaces, last mile connectivity, sustainable urban mobility

Procedia PDF Downloads 253
19499 Bridging the Gap between M and E, and KM: Towards the Integration of Evidence-Based Information and Policy Decision-Making

Authors: Xueqing Ivy Chen, Christo De Coning

Abstract:

It is clear from practice that a gap exists between Result-Based Monitoring and Evaluation (RBME) as a discipline, and Knowledge Management (KM) on the other hand. Whereas various government departments have institutionalised these functions, KM and M&E has functioned in isolation from each other in a practical sense in the public sector. It’s therefore necessary to explore the relationship between KM and M&E and the necessity for integration, so that a convergence of these disciplines can be established. An integration of KM and M&E will lead to integration and improvement of evidence-based information and policy decision-making. M&E and KM process models are available but the complementarity between specific process steps of these process models are not exploited. A need exists to clarify the relationships between these functions in order to ensure evidence based information and policy decision-making. This paper will depart from the well-known policy process models, such as the generic model and consider recent on the interface between policy, M&E and KM.

Keywords: result-based monitoring and evaluation, RBME, knowledge management, KM, evident based decision making, public policy, information systems, institutional arrangement

Procedia PDF Downloads 153
19498 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 319
19497 3D Printing for Maritime Cultural Heritage: A Design for All Approach to Public Interpretation

Authors: Anne Eugenia Wright

Abstract:

This study examines issues in accessibility to maritime cultural heritage. Using the Pillar Dollar Wreck in Biscayne National Park, Florida, this study presents an approach to public outreach based on the concept of Design for All. Design for All advocates creating products that are accessible and functional for all users, including those with visual, hearing, learning, mobility, or economic impairments. As a part of this study, a small exhibit was created that uses 3D products as a way to bring maritime cultural heritage to the public. It was presented to the public at East Carolina University’s Joyner Library. Additionally, this study presents a methodology for 3D printing scaled photogrammetry models of archaeological sites in full color. This methodology can be used to present a realistic depiction of underwater archaeological sites to those who are incapable of accessing them in the water. Additionally, this methodology can be used to present underwater archaeological sites that are inaccessible to the public due to conditions such as visibility, depth, or protected status. This study presents a practical use for 3D photogrammetry models, as well as an accessibility strategy to expand the outreach potential for maritime archaeology.

Keywords: Underwater Archaeology, 3D Printing, Photogrammetry, Design for All

Procedia PDF Downloads 141
19496 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 433
19495 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency

Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo

Abstract:

Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.

Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods

Procedia PDF Downloads 149
19494 Finding the English Competency for Developing Public Health Village Volunteers at Ban Prasukchai in Chumpuang District, Nakhon Ratchasima Province in Thailand

Authors: Kittivate Boonyopakorn

Abstract:

The purposes of this study were to find the English competence of the public health volunteers and to develop the use of their English. The samples for the study were 41 public health village volunteers at Ban Prasukchai, in Thailand. The findings showed that the sum of all scores for the pre-test was 452, while the score for the post-test was 1,080. Therefore, the results of the experiment confirm that the post-test scores (1,080) significantly are higher than the pre-test (452). The mean score (N=41) for the pre-test was 11.02 while the mean score (N=41) for the post-test was 18.10. The standard deviation for the pre-test was 2.734; however, for the post-test it was 1.934. In addition to the experts-evaluated research tools, the results of the evaluation for the structured interviews (IOC) were 1 in value. The evaluation of congruence for the content with learning objectives (IOC) were 0.66 to 1.00 in value. The evaluation of congruence for the pre and post-test with learning objectives (IOC) are 1 in value.

Keywords: finding the English competency, developing public health, village volunteers

Procedia PDF Downloads 452
19493 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption

Authors: Koyangbo Guere Monguia Michel Alex Emmanuel

Abstract:

In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.

Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization

Procedia PDF Downloads 360
19492 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 202
19491 Nutrition Environments and the Development of Taste Preferences: A Cross-Sectional Study of Primary School Children in Trinidad and Tobago

Authors: Fareena Alladin

Abstract:

In the Caribbean, issues of food security, health and taste are intricately linked, seen most clearly in the increasing incidence of lifestyle diseases among children coupled with a taste for high calorie and Westernized diets. In order to fully appreciate this link, the role of nutrition environments must be examined. To this end, the present study incorporates tenets of Bourdieu’s social constructivist theory with the Community Nutrition Environment Model. The aim of this study was to examine the relationships between availability of and access to healthy/unhealthy foods within nutrition environments, namely the household and school, and the development of taste preferences for healthy/unhealthy foods among primary school children in a selected educational district in Trinidad and Tobago. A cross-sectional survey of 400 children between the ages of 9 and 11 years was conducted. Data analysis was conducted using SPSS 24. Results indicated that availability of healthy food at home was positively correlated with preference for vegetables, and negatively correlated with preference for salty snacks and fast food. The availability of unhealthy food within the home was found to be negatively correlated with preference for vegetables and positively correlated with preference for salty snacks. Access to unhealthy foods at school had a positive correlation with preference for fast food. These findings highlight the role of the food environment in shaping taste preferences, and point to the need for interrogating the centrality of food security concerns in emerging health concerns of Caribbean countries. Such interrogations are a necessary part of the development of research agendas, and policy formulation and implementation.

Keywords: food security, nutrition environment, taste preference, Trinidad and Tobago

Procedia PDF Downloads 136
19490 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 790
19489 Understanding the Effect of Fall Armyworm and Integrated Pest Management Practices on the Farm Productivity and Food Security in Malawi

Authors: Innocent Pangapanga, Eric Mungatana

Abstract:

Fall armyworm (FAW) (Spodoptera frugiperda), an invasive lepidopteran pest, has caused substantial yield loss since its first detection in September 2016, thereby threatening the farm productivity food security and poverty reduction initiatives in Malawi. Several stakeholders, including households, have adopted chemical pesticides to control FAW without accounting for its costs on welfare, health and the environment. Thus, this study has used panel data endogenous switching regression model to investigate the impact of FAW and the integrated pest management (IPM) –related practices on-farm productivity and food security. The study finds that FAW substantively reduces farm productivity by seven (7) percent and influences the adoption of IPM –related practices, namely, intercropping, mulching, and agroforestry, by 6 percent, ceteris paribus. Interestingly, multiple adoptions of the IPM -related practices noticeably increase farm productivity by 21 percent. After accounting for potential endogeneity through the endogenous switching regression model, the IPM practices further demonstrate tenfold more improvement on food security, implying the role of the IPM –related practices in containing the effect of FAW at the household level.

Keywords: hunger, invasive fall army worms, integrated pest management practices, farm productivity, endogenous switching regression

Procedia PDF Downloads 138
19488 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 149