Search results for: state security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9533

Search results for: state security

8453 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 301
8452 Breaching Treaty Obligations of the Rome Statute of the International Criminal Court: The Case of South Africa

Authors: David Abrahams

Abstract:

In October 2016 South Africa deposited its ‘instrument of withdrawal’ from the Rome Statute of the International Criminal Court, with the Secretary-General of the United Nations. The Rome Statute is the founding document of the treaty-based International Criminal Court (ICC). The ICC has jurisdiction to hear cases where crimes against humanity, war crimes and genocide have been committed, on the basis of individual criminal responsibility. It is therefore not surprising that one of the ICCs mandates is to ensure that the sufferings, due to gross human rights violations towards the civilian population is, in principle, brought to an end by punishing those individuals responsible, thus providing justice to the victims. The ICC is unable to effectively fulfill its mandate and thus depends, in part on the willingness of states to assist the Court in its functions. This requires states to ratify the Statute and to domesticate its provisions, depending on whether it is a monist or dualist state. South Africa ratified the Statute in November 2000, and domesticated the Statute in 2002 by virtue of the Implementation of the Rome Statute of the International Criminal Court Act 27 of 2002. South Africa thus remains under an obligation to cooperate with the ICC until the final date of withdrawal, which is October 2017. An AU Summit was hosted by South Africa during June 2015. Omar Al-Bashir, whom the prosecutor of the ICC has indicted on two separate occasions, was invited to the summit. South Africa made an agreement with the AU that it will honour its obligations in terms of its Diplomatic and Immunities Privileges Act of 2001, by granting immunity to all heads of state, including that of Sudan. This decision by South Africa has raised a plethora of questions regarding the status and hierarchy of international laws versus regional laws versus domestic laws. In particular, this paper explores whether a state’s international law treaty obligations may be suspended in favour of, firstly, regional peace (thus safeguarding the security of the civilian population against further atrocities and other gross violations of human rights), and secondly, head of state immunity. This paper also reflects on the effectiveness of the trias politca in South Africa in relation the manner in which South African courts have confirmed South Africa’s failure in fulfilling its obligations in terms of the Rome Statute. A secondary question which will also be explored, is whether the Rome Statute is currently an effective tool in dealing with gross violations of human rights, particularly in a regional African context, given the desire by a number of African states currently party to the Statute, to engage in a mass exodus from the Statute. Finally, the paper concludes with a proposal that there can be no justice for victims of gross human rights violations unless states are serious in playing an instrumental role in bringing an end to impunity in Africa, and that withdrawing from the ICC without an alternative, effective system in place, will simply perpetuate impunity.

Keywords: African Union, diplomatic immunity, impunity, international criminal court, South Africa

Procedia PDF Downloads 518
8451 Time Series Modelling for Forecasting Wheat Production and Consumption of South Africa in Time of War

Authors: Yiseyon Hosu, Joseph Akande

Abstract:

Wheat is one of the most important staple food grains of human for centuries and is largely consumed in South Africa. It has a special place in the South African economy because of its significance in food security, trade, and industry. This paper modelled and forecast the production and consumption of wheat in South Africa in the time covid-19 and the ongoing Russia-Ukraine war by using annual time series data from 1940–2021 based on the ARIMA models. Both the averaging forecast and selected models forecast indicate that there is the possibility of an increase with respect to production. The minimum and maximum growth in production is projected to be between 3million and 10 million tons, respectively. However, the model also forecast a possibility of depression with respect to consumption in South Africa. Although Covid-19 and the war between Ukraine and Russia, two major producers and exporters of global wheat, are having an effect on the volatility of the prices currently, the wheat production in South African is expected to increase and meat the consumption demand and provided an opportunity for increase export with respect to domestic consumption. The forecasting of production and consumption behaviours of major crops play an important role towards food and nutrition security, these findings can assist policymakers and will provide them with insights into the production and pricing policy of wheat in South Africa.

Keywords: ARIMA, food security, price volatility, staple food, South Africa

Procedia PDF Downloads 89
8450 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 497
8449 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 192
8448 Integrating One Health Approach with National Policies to Improve Health Security post-COVID-19 in Vietnam

Authors: Yasser Sanad, Thu Trang Dao

Abstract:

Introduction: Implementing the One Health (OH) approach requires an integrated, interdisciplinary, and cross-sectoral methodology. OH is a key tool for developing and implementing programs and projects and includes developing ambitious policies that consider the common needs and benefits of human, animal, plant, and ecosystem health. OH helps humanity readjust its path to environmentally friendly and impartial sustainability. As co-leader of the Global Health Security Agenda’s Zoonotic Disease Action Package, Vietnam pioneered a strong OH approach to effectively address early waves of the COVID-19 outbreak in-country. Context and Aim: The repeated surges in COVID-19 in Vietnam challenged the capabilities of the national system and disclosed the gaps in multi-sectoral coordination and resilience. To address this, FHI 360 advocated for the standardization of the OH platform by government actors to increase the resiliency of the system during and post COVID-19. Methods: FHI 360 coordinated technical resources to develop and implement evidence-based OH policies, promoting high-level policy dialogue between the Ministries of Health, Agriculture, and the Environment, and policy research to inform developed policies and frameworks. Through discussions, an OH-building Partnership (OHP) was formed, linking climate change, the environment, and human and animal health. Findings: The OHP Framework created a favorable policy environment within and between sectors, as well as between governments and international health security partners. It also promoted strategic dialogue, resource mobilization, policy advocacy, and integration of international systems with National Steering Committees to ensure accountability and emphasize national ownership. Innovative contribution to policy, practice and/or research: OHP was an effective evidence-based research-to-policy platform linking to the National One Health Strategic Plan (2021-2025). Collectively they serve as a national framework for the implementation and monitoring of OH activities. Through the adoption of policies and plans, the risk of zoonotic pathogens, environmental agent spillover, and antimicrobial resistance can be minimized through strengthening multi-sectoral OH collaboration for health security.

Keywords: one health, national policies, health security, COVID-19, Vietnam

Procedia PDF Downloads 89
8447 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 108
8446 Analysis of the Social Impact of Agro-Allied Industries on the Rural Dwellers in Benue State, Nigeria

Authors: Ali Ocholi

Abstract:

The study was conducted to analyze the impact of agro-allied industries on rural dwellers in Benue state, Nigeria. Stratified random sampling technique was used to select the respondents for the study. Primary data were collected through the use of structured questionnaires administered on 366 respondents from the selected communities; the data were analyzed using both descriptive and inferential statistics. The result of Mann-Whitney (U) statistics showed that water availability (14350) and good road network (15082.00) were the only social impact derived from the industries by the rural dwellers. The study recommended that right and proper policies and programmes should be put in place by the government to mandate all private and public agro-allied industries to embark on projects that would be in favour of the rural dwellers where the agro-allied industries are situated.

Keywords: agriculture, agro-allied industry, rural dwellers, Benue state

Procedia PDF Downloads 235
8445 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 227
8444 An E-Government Implementation Model for Peruvian State Companies Based on COBIT 5.0: Definition and Goals of the Model

Authors: M. Bruzza, M. Tupia, F. Rodríguez

Abstract:

As part of the regulatory compliance process and the streamlining of public administration, the Peruvian government has implemented the National E-Government Plan in all state institutions with the aim of providing citizens with solid services based on the use of Information and Communications Technologies (ICT). As part of the regulations, the requisites to be met by public institutions have been submitted. However, the lack of an implementation model was detected, one that can serve as a guide to such institutions in order to materialize the organizational and technological structures needed, which allow them to provide the required digital services. This paper develops an implementation model of electronic government (e-government) for Peru’s state institutions, in compliance with current regulations based on a COBIT 5.0 framework. Furthermore, the paper introduces phase 1 of this model: business and IT goals, the goals cascade and the future model of processes.

Keywords: e-government, u-government, COBIT, implementation model

Procedia PDF Downloads 315
8443 Determining Importance Level of Factors Affecting Selection of Online Shopping Website with AHP: A Research on Young Consumers

Authors: Nurullah Ekmekci, Omer Akkaya, Vural Cagliyan

Abstract:

Increased use of the Internet has resulted in the emergence of a new retail types called online shopping or electronic retail (e-retail). The rapid growth of the Internet has enabled customers to search information about the product and buy these products or services from e-retailers. Although this new form of shopping has grown in a remarkable way because of offering easiness to people, it is not an easy task to capture the success by distinguishing from competitors in this environment which millions of players takes place. For the success, e-retailers should determine the factors which the customers take notice while they are buying from e-retailers. This paper aims to identify the factors that provide preferability for the online shopping websites and the importance levels of these factors. These main criteria which have taken notice are Customer Service Performance (CSP), Website Performance (WSP), Criteria Related to Product (CRP), Ease of Payment (EP), Security/Privacy (SP), Ease of Return (ER), Delivery Service Performance (DSP) and Order Fulfillment Performance (OFP). It has benefited from Analytic Hierarchy Process to determine the priority of the criteria. Based on analysis, Security/Privacy (SP) criteria seems to be most important criterion with 22 % weight. Companies should attach importance to the security and privacy for making their online website more preferable among the online shoppers.

Keywords: AHP (analytical hierarchy process), multi-criteria decision making, online shopping, shopping

Procedia PDF Downloads 233
8442 Agriculture, Food Security and Poverty Reduction in Nigeria: Cointegration and Granger Causality Approach

Authors: Ogunwole Cecilia Oluwakemi, Timothy Ayomitunde Aderemi

Abstract:

Provision of sufficient food and elimination of abject poverty have usually been the conventional benefits of agriculture in any society. Meanwhile, despite the fact that Nigeria is an agrarian society, food insecurity and poverty have become the issues of concern among both scholars and policymakers in the recent times. Against this backdrop, this study examined the nexus among agriculture, food security, and poverty reduction in Nigeria from 1990 to 2019 within the framework of the Cointegration and Granger Causality approach. Data was collected from the Central Bank of Nigeria Statistical Bulletin and the World Development Indicators, respectively. The following are the major results that emanated from the study. A long run equilibrium relationship exists among agricultural value added, food production index, and GDP per capita in Nigeria. Similarly, there is a unidirectional causality which flows from food production index to poverty reduction in Nigeria. In the same vein, one way causality flows from poverty reduction to agricultural value added in Nigeria. Consequently, this study makes the following recommendation for the policymakers in Nigeria, and other African countries by extension, that agricultural value added and food production are the important variables that cannot be undermined when poverty reduction occupies the central focus of the policymakers. Therefore, any time these policymakers want to reduce poverty, policies that drive agricultural value added and food production should be embarked upon. Therefore, this study will contribute to the literature by establishing the type of linkage that exists between agriculture, food security, and poverty reduction in Nigeria.

Keywords: agriculture, value added, food production, GDP per capita, Nigeria

Procedia PDF Downloads 167
8441 Exploration of RFID in Healthcare: A Data Mining Approach

Authors: Shilpa Balan

Abstract:

Radio Frequency Identification, also popularly known as RFID is used to automatically identify and track tags attached to items. This study focuses on the application of RFID in healthcare. The adoption of RFID in healthcare is a crucial technology to patient safety and inventory management. Data from RFID tags are used to identify the locations of patients and inventory in real time. Medical errors are thought to be a prominent cause of loss of life and injury. The major advantage of RFID application in healthcare industry is the reduction of medical errors. The healthcare industry has generated huge amounts of data. By discovering patterns and trends within the data, big data analytics can help improve patient care and lower healthcare costs. The number of increasing research publications leading to innovations in RFID applications shows the importance of this technology. This study explores the current state of research of RFID in healthcare using a text mining approach. No study has been performed yet on examining the current state of RFID research in healthcare using a data mining approach. In this study, related articles were collected on RFID from healthcare journal and news articles. Articles collected were from the year 2000 to 2015. Significant keywords on the topic of focus are identified and analyzed using open source data analytics software such as Rapid Miner. These analytical tools help extract pertinent information from massive volumes of data. It is seen that the main benefits of adopting RFID technology in healthcare include tracking medicines and equipment, upholding patient safety, and security improvement. The real-time tracking features of RFID allows for enhanced supply chain management. By productively using big data, healthcare organizations can gain significant benefits. Big data analytics in healthcare enables improved decisions by extracting insights from large volumes of data.

Keywords: RFID, data mining, data analysis, healthcare

Procedia PDF Downloads 225
8440 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 746
8439 A Literature Review of Precision Agriculture: Applications of Diagnostic Diseases in Corn, Potato, and Rice Based on Artificial Intelligence

Authors: Carolina Zambrana, Grover Zurita

Abstract:

The food loss production that occurs in deficient agricultural production is one of the major problems worldwide. This puts the population's food security and the efficiency of farming investments at risk. It is to be expected that this food security will be achieved with the own and efficient production of each country. It will have an impact on the well-being of its population and, thus, also on food sovereignty. The production losses in quantity and quality occur due to the lack of efficient detection of diseases at an early stage. It is very difficult to solve the agriculture efficiency using traditional methods since it takes a long time to be carried out due to detection imprecision of the main diseases, especially when the production areas are extensive. Therefore, the main objective of this research study is to perform a systematic literature review, of the latest five years, of Precision Agriculture (PA) to be able to understand the state of the art of the set of new technologies, procedures, and optimization processes with Artificial Intelligence (AI). This study will focus on Corns, Potatoes, and Rice diagnostic diseases. The extensive literature review will be performed on Elsevier, Scopus, and IEEE databases. In addition, this research will focus on advanced digital imaging processing and the development of software and hardware for PA. The convolution neural network will be handling special attention due to its outstanding diagnostic results. Moreover, the studied data will be incorporated with artificial intelligence algorithms for the automatic diagnosis of crop quality. Finally, precision agriculture with technology applied to the agricultural sector allows the land to be exploited efficiently. This system requires sensors, drones, data acquisition cards, and global positioning systems. This research seeks to merge different areas of science, control engineering, electronics, digital image processing, and artificial intelligence for the development, in the near future, of a low-cost image measurement system that allows the optimization of crops with AI.

Keywords: precision agriculture, convolutional neural network, deep learning, artificial intelligence

Procedia PDF Downloads 69
8438 Federalism and Foreign Affairs: The International Relations of Mexican Sub-State Governments

Authors: Jorge A. Schiavon

Abstract:

This article analyzes the international relations of sub-State governments (IRSSG) in Mexico. It aims to answer five questions: 1) What explains the recent and dramatic increase in their international activities? 2) What is the impact of federalism on the foreign affairs of the federal units? 3) What are the levels or degrees of IRSSG and how have they changed over the last years? 4) How do Mexican federal units institutionalize their international activities? 5) What are the perceptions and capacities of the federal units in their internationalization process? The first section argues that the growth in the IRSSG is generated by growing interdependence and globalization in the international system, and democratization, decentralization and structural reform in the national arena. The second section sustains that the renewed Mexican federalism has generated the incentives for SSG to participate more intensively in international affairs. The third section defends that there is a wide variation in their degree of international participation, which is measured in three moments in time (2004 2009 and 2014), and explains how this activity has changed in the last decade. The fourth section studies the institutionalization of the IRSSG in Mexico through the analysis of Inter-Institutional Agreements (IIA). Finally, the last section concentrates in explaining the perceptions and capacities of Mexican sub-State governments to conduct international relations.

Keywords: federalism, foreign policy, international relations of sub-state governments, paradiplomacy, Mexico

Procedia PDF Downloads 139
8437 Stochastic Model Predictive Control for Linear Discrete-Time Systems with Random Dither Quantization

Authors: Tomoaki Hashimoto

Abstract:

Recently, feedback control systems using random dither quantizers have been proposed for linear discrete-time systems. However, the constraints imposed on state and control variables have not yet been taken into account for the design of feedback control systems with random dither quantization. Model predictive control is a kind of optimal feedback control in which control performance over a finite future is optimized with a performance index that has a moving initial and terminal time. An important advantage of model predictive control is its ability to handle constraints imposed on state and control variables. Based on the model predictive control approach, the objective of this paper is to present a control method that satisfies probabilistic state constraints for linear discrete-time feedback control systems with random dither quantization. In other words, this paper provides a method for solving the optimal control problems subject to probabilistic state constraints for linear discrete-time feedback control systems with random dither quantization.

Keywords: optimal control, stochastic systems, random dither, quantization

Procedia PDF Downloads 433
8436 Thermal and Caloric Imperfections Effect on the Supersonic Flow Parameters with Application for Air in Nozzles

Authors: Merouane Salhi, Toufik Zebbiche, Omar Abada

Abstract:

When the stagnation pressure of perfect gas increases, the specific heat and their ratio do not remain constant anymore and start to vary with this pressure. The gas does not remain perfect. Its state equation change and it becomes a real gas. In this case, the effects of molecular size and inter molecular attraction forces intervene to correct the state equation. The aim of this work is to show and discuss the effect of stagnation pressure on supersonic thermo dynamical, physical and geometrical flow parameters, to find a general case for real gas. With the assumptions that Berthelot’s state equation accounts for molecular size and inter molecular force effects, expressions are developed for analyzing supersonic flow for thermally and calorically imperfect gas lower than the dissociation molecules threshold. The designs parameters for supersonic nozzle like thrust coefficient depend directly on stagnation parameters of the combustion chamber. The application is for air. A computation of error is made in this case to give a limit of perfect gas model compared to real gas model.

Keywords: supersonic flow, real gas model, Berthelot’s state equation, Simpson’s method, condensation function, stagnation pressure

Procedia PDF Downloads 504
8435 Effect of Sintering Temperature on Transport Properties of Garnet-Type Solid-State Electrolytes for Energy Storage Systems

Authors: U. Farooq, A. Samson, V. Thangadurai, R. Edwards

Abstract:

In recent years, an impressive research has been conducted to introduce the solid-state electrolytes for the future energy storage devices like Li-ion batteries more specifically. In this work we tried to prepare a ceramic electrolyte (Li6.5 La2.5 Ba0.5 Nb Zr O12(LLBNZO)) and sintered the pallets of as-prepared material at elevated temperature like 1050, 1100, 1150 and 1200 °C. The objective to carry out this research was to observe the effect of temperature on porosity, density and transport properties of materials. Preliminary results suggest that the material sintered at higher temperature could show enhanced performance in terms of fast ionic transport. This enhancement in performance can be attributed to low porosity of materials which is result of high temperature sintering.

Keywords: solid state battery, electrolyte, garnet structures, Li-ion battery

Procedia PDF Downloads 266
8434 Fracking the UK's Shale Gas Regulatory Regime

Authors: Yanal Abul Failat

Abstract:

The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.

Keywords: shale gas, UK, legal, oil and gas, energy

Procedia PDF Downloads 701
8433 E-Marketing Strategy: A Competitive Advantage among Commercial Banks Branches in Bauchi State

Authors: Sagir Abubakar

Abstract:

The electronic means of transaction has provided an opportunity especially for commercial banks to entice more customers that will subsequently boost their return on investment. It moves them from traditional marketing into digital marketing and gives them a competitive advantage over others in the same industry.The paper, therefore, examined the competitive advantage of the electronic marketing strategy among commercial banks branches in Bauchi state. The main objective of the study was to determine the impact of e-marketing strategy as a competitive advantage among commercial banks branches in Bauchi state and to evaluate the level of enlightenment campaign offered by the commercial banks branches to their customers on e-marketing. The study obtained data from the staff of the five (s) selected banks branches as the respondents to answer the questionnaire. The research is a quantitative research, where the data where obtained using questionnaire. 100 questionnaires were distributed and analyzed using SPSS’s regression analysis. The research among other findings discovered that, the e-marketing has led to a significant improvement in the banking industry and is expected to continue because of the improvement in the ICT sector. It was also found out that most customers are not aware of the electronic products offered by commercial banks branches in Bauchi state. Some of factors affecting the adoption of e-marketing by banks as indicated from the findings include: top management commitment, government policy on ICT and availability of ICT personnel. The study recommended that commercial banks branches should engage in enlightenment campaign about the existing of their e- products/services, management should place an incentives in order to raise the interest of customers to patronize the products/services online.

Keywords: e-marketing strategy, competitive advantage, banks, Bauchi State

Procedia PDF Downloads 314
8432 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations

Authors: Sadiq Nasir

Abstract:

The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.

Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security

Procedia PDF Downloads 78
8431 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review

Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani

Abstract:

Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.

Keywords: cost, mobility, reliability, speed, security, wired, wireless

Procedia PDF Downloads 458
8430 Medium Composition for the Laboratory Production of Enzyme Fructosyltransferase (FTase)

Authors: O. R. Raimi, A. Lateef

Abstract:

Inoculum developments of A. niger were used for inoculation of medium for submerged fermentation and solid state fermentation. The filtrate obtained were used as sources of the extra-cellular enzymes. The FTase activities and the course of pH in submerged fermentation ranged from 7.53-24.42µ/ml and 4.4-4.8 respectively. The maximum FTase activity was obtained at 48 hours fermentation. In solid state fermentation, FTase activities ranged from 2.41-27.77µ/ml. Using ripe plantain peel and kola nut pod respectively. Both substrates supported the growth of the fungus, producing profuse growth during fermentation. In the control experiment (using kolanut pod) that lack supplementation, appreciable FTase activity of 16.92µ/ml was obtained. The optimum temperature range was 600C. it was also active at broad pH range of 1-9 with optimum obtain at pH of 5.0. FTase was stable within the range of investigated pH showing more than 60% activities. FTase can be used in the production of fructooligosaccharide, a functional food.

Keywords: Aspergillus niger, solid state fermentation, kola nut pods, Fructosyltransferase (FTase)

Procedia PDF Downloads 444
8429 The Impact of School Environment and Peer Relation on Anti-Social Behaviour of Students in Science Secondary Schools in Katsina State

Authors: Umar Mamman

Abstract:

The study investigated the impact of school environment and peer relations on antisocial behaviour of the students of science secondary schools in Katsina State. The study sought to achieve the following objectives: to determine whether school influences antisocial behaviour among science secondary school students, and to determine whether peer relation influences anti-social behaviour among science secondary school students. The study population composed of all the students in science secondary schools in Katsina State. The study used a sample of 378 students and 18 teachers randomly selected from eleven science secondary schools in Katsina state. Three instruments were used to collect data for the study, thus: socio-economic status background questionnaire, antisocial process screening device (APSD), and inventory of parent and peer relationship questionnaire. The study findings revealed that school environment has significant effect on antisocial behaviour of the students in science secondary school (F (7, 372) = 52.08, p ≤ .01), and there is a significant effect of peer relation on antisocial behaviour of the students in science secondary school (F (7, 372) = 14.229, p ≤ .01). Based on these findings the following major recommendations were made: School environment should be made attractive and conducive for learning and character development. Teachers, as role model, should desist from indecent acts. School environment should be made learner-centered and friendly. Functional guidance and counselling outfits need to be provided in all secondary schools in Katsina state.

Keywords: school environment, peer relation, anti-social behaviour, psychology

Procedia PDF Downloads 343
8428 Iraqi Women’s Rights Under State Civil Law and Conservative Influences: A Study of Legal Documents and Social Implementation

Authors: Rose Hattab

Abstract:

Women have been an important dynamic in religious context and the state-building process of Arab countries throughout history. During the 1970s as the movement for women’s activism and rights developed, the Iraqi state under the Ba’ath Party began to provide Iraqi women with legal and civil rights. This was done to liberate women from the grasps of social traditions and was a tangible espousing of equality between men and women in the process of nation-building. Whereas women’s rights were stronger and more supported throughout the earliest years of the Ba’ath Regime (1970-1990), the aftermath of the Gulf War and economic sanctions on the conditions of Iraqi society laid the foundation for a division of women’s rights between civil and religious authorities. Personal status codes that were secured in 1959 were being pushed back by amendments made in coordination with religious leaders. Civil laws were present on paper, but religious authority took prominence in practice. The written legal codes were inclusive of women’s rights, but there is not an active or ensured practice of these rights within Iraqi society. This is due to many different factors, such as religious, sectarian, political and conservative reasons that hold back or limit the ability for Iraqi women to have autonomy in aspects such as participation in the workforce, getting married, and ensuring social justice. This paper argues that the Personal Status Code introduced in 1959 – which replaced Sharia-run courts with personal status courts – provided Iraqi women with equality and increased mobility in social and economic dynamics. The statewide crisis felt after the Gulf War and the economic sanctions imposed by the United Nations led to a stark shift in the Ba’ath party’s political ideology. This ideological turn guided the social system to the embracement of social conservatism and religious traditions in the 1990s. The effect of this implementation continued after the establishment of a new Iraqi government during 2003-2005. Consequently, Iraqi women's rights in employment, marriage, and family became divided into paper and practice by religious authorities and civil law from that period to the present day. This paper also contributes to the literature by expanding on the gap between legal codes on paper and in practice, through providing an analysis of Iraqi women’s rights in the Iraqi Constitution of 2005 and Iraq’s Penal Code. The turn to conservative and religious traditions is derived from the multiplicity of identities that make up the Iraqi social fabric. In the aftermath of a totalitarian regime, active wars, and economic sanctions, the Iraqi people attempted to unite together through their different identities to create a sense of security in the midst of violence and chaos. This is not an excuse to diminish the importance of women’s rights, but in the process of building a new nation-state, women were lost from the narrative. Thus, the presence of gender equity is found in the written text but is not practiced and upheld in the social context.

Keywords: civil rights, Iraqi women, nation building, religion and conflict

Procedia PDF Downloads 132
8427 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 109
8426 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria

Authors: O. J. Ajayi, J. H. Tsado, F. Olah

Abstract:

The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.

Keywords: ICT, cassava farmers, inputs, output

Procedia PDF Downloads 301
8425 E-Marketing Strategy a Competitive Advantage among Commercial Bank Branches in Bauchi State

Authors: Sagir Abubakar

Abstract:

The electronic means of transaction has provided an opportunity especially for commercial banks to entice more customers that will subsequently boost their return on investment. It moves them from traditional marketing into digital marketing and gives them a competitive advantage over others in the same industry. The paper, therefore, examined the competitive advantage of the electronic marketing strategy among commercial banks branches in Bauchi state. The main objective of the study was to determine the impact of e-marketing strategy as a competitive advantage among commercial banks branches in Bauchi state and to evaluate the level of enlightenment campaign offered by the commercial banks branches to their customers on e-marketing. The study obtained data from the staff of the five (s) selected banks branches as the respondents to answer the questionnaire. The research is a quantitative research, where the data where obtained using questionnaire. 100 questionnaires were distributed and analyzed using SPSS’s regression analysis. The research among other findings discovered that the e-marketing has led to a significant improvement in the banking industry and is expected to continue because of the improvement in the ICT sector. It was also found out that most customers are not aware of the electronic products offered by commercial banks branches in Bauchi state. Some of factors affecting the adoption of e-marketing by banks as indicated from the findings include: top management commitment, government policy on ICT and availability of ICT personnel. The study recommended that commercial banks branches should engage in enlightenment campaign about the existing of their e- products/services, management should place an incentive in order to raise the interest of customers to patronize the products/services online.

Keywords: e-marketing strategy, competitive advantage, banks, Bauchi State

Procedia PDF Downloads 468
8424 State Rescaling of the Urban Development in Hong Kong after the Reunification: A Case Study of the Planning Process of the Hong Kong Section of the Guangzhou-Shenzhen-Hong Kong Express Rail Link

Authors: Zhihua Xu

Abstract:

In the era of globalization, the urban question is increasingly being posed in the form of a scale question. Scale theory provides a new perspective for analyzing various dynamics and their influences on urban development. After the reunification, how the government of the Hong Kong Special Administrative Region (SAR) interacts with the actors at various scales and carries out state rescaling are the keys to exploring the issue of urban development and governance in Hong Kong. This paper examines the entire planning process of the Hong Kong Section of the Guangzhou-Shenzhen-Hong Kong Express Rail Link, from project conception, design, to consultation, and fund application, to identify the actors at different scales involved in the process, and analyze the modes and consequences of their interaction. This study shows that after the reunification, the Hong Kong SAR Government takes the initiative to scale up to expand its hinterland. Intergovernmental institutional cooperation is an important mode of state rescaling for the Hong Kong SAR government. Meanwhile, the gradually growing civil society plays an important role in the rescaling of urban development. Local actors use scalar politics to construct discourses and take actions at multiple scales to challenge the government’s proposal and trigger a discussion on the project throughout the Hong Kong society. The case study of Hong Kong can deepen the understanding of state rescaling of territorial organizations in the context of institutional transformation and enrich the theoretical connotation of state rescaling. It also helps the Mainland government to better understand the case of Hong Kong and formulate appropriate.

Keywords: Hong Kong, state rescaling, scalar politics, Hong Kong section of the Guangzhou-Shenzhen-Hong Kong express rail link, urban governance

Procedia PDF Downloads 204