Search results for: public security
7133 Beyond Informality: Relocation from a Traditional Village 'Mit Oqbah' to Masaken El-Barageel and the Role of ‘Urf in Governing Built Environment, Egypt
Authors: Sarah Eldefrawi, Maike Didero
Abstract:
In Egypt, residents’ urban interventions (colloquially named A’hali’s interventions) are always tackled by government, scholars, and media as an encroachment (taeadiyat), chaotic (a’shwa’i) or informal (gheir mokanan) practices. This paper argues that those interventions cannot be simply described as an encroachment on public space or chaotic behaviour. We claim here that they are relevant to traditional governing methods (‘Urf) that were governing Arab cities for many decades. Through an in-depth field study conducted in a real estate public housing project in the city of Giza called 'Masaken El-Barageel', we traced the urban transformations demonstrated in private and public spaces. To understand those transformations, we used wide-range of qualitative research methods such as semi-guided and informal interviews, observations and mapping of the built environment and the newly added interventions. This study was as well strengthened through the contributions of the author in studying nine sectors emerging by Ahali in six districts in Great Cairo. The results of this study indicate that a culturally and socially sensitive framework has to be related to the individual actions toward the spatial and social structures as well as to culturally transmitted views and meanings connected with 'Urf'. The study could trace three crucial principals in ‘urf that influenced these interventions; the eliminating of harm (Al-Marafiq wa Man’ al-Darar), the appropriation of space (Haqq el-Intefa’) and public interest (maslaha a’ma). Our findings open the discussion for the (il) legitimate of a’hali governing methods in contemporary cities.Keywords: Urf, urban governance, public space, public housing, encroachments, chaotic, Egyptian cities
Procedia PDF Downloads 1347132 The Impact of Rapid Urbanisation on Public Transport Systems in the Gauteng Region of South Africa
Authors: J. Chakwizira, P. Bikam, T. A. Adeboyejo
Abstract:
This paper seeks to illustrate the impact of rapid urbanization (in terms of both increase in people and vehicles) in the Gauteng region (which includes Johannesburg, Pretoria and Ekurhuleni). The impact that existing transport systems and options place on the capacity of residents from low income areas to travel and conduct various socio-economic activities is discussed. The findings are drawn from a 2013 analysis of a random transport household survey of 1550 households carried out in Gauteng province. 91.4% of the study respondents had access to public transport, while 8.6% had no access to public transport. Of the 91.4% who used public transport, the main reason used to explain this state of affairs was that it was affordable (54.3%), convenient (15.9%), Accessible (11.9%), lack of alternatives (6.4%) and reliable at 4.1%. Recommendations advanced revolve around the need to reverse land use and transportation effects of apartheid planning, growing and developing a sustainable critical mass of public transport interventions supported by appropriate transport systems that are environmentally sustainable through proper governance. 38.5% of the respondents indicated that developing compact, smart and integrated urban land spaces was key to reducing travel challenges in the study area. 23.4% indicated that the introduction and upgrading of BRT buses to cover all areas in the study area was a step in the right direction because it has great potential in shifting travel patterns to favor public modes of transport. 15.1% indicated that all open spaces should be developed so that fragmentation of land uses can be addressed. This would help to fight disconnected and fragmented space and trip making challenges in Gauteng. 13.4% indicated that improving the metro rail services was critical since this is a mass mover of commuters. 9.6% of the respondents highlighted that the bus subsidy policy has to be retained in the short to medium term since the spatial mismatches and challenges created by apartheid are yet to be fully reversed.Keywords: urbanisation, population, public, transport systems, Gauteng
Procedia PDF Downloads 2877131 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2807130 Public and Private Involvement in Agricultural Extension Services: Factors of Farmers’ Preference in Southwestern Nigeria
Authors: S. O. Ayansina, O. A. Adekunle
Abstract:
There is an increasing demand for a functional extension delivery services in Nigeria with a view to meet up with the food and fiber needs of the ever growing population of human and animal respectively. The study was therefore designed to examine the farmers’ preference for public and private extension services in Southwestern Nigeria, specifically to determine the farmers’ level of participation in the two types of organizations involved and also to evaluate the Performance level of personnel in the two organizations in order to ascertain the beneficiaries’ satisfaction. A multi-stage random sampling technique was used to samples 30 respondents from each of the three selected organizations in each of the three states sampled in Southwestern Nigeria. Hence, 270 respondents were sampled for the study. Data collected were analyzed with Kruskal Wallis one-way Analysis of variance to test the difference between the participation of beneficiaries in the public and private extension services and the level of benefit accrued from the two organizations involved in the study. Results generally revealed that private organizations were performing better and were more preferred by the beneficiaries. Results of the tested hypotheses as shown by Kruskal Wallis test of difference (x2=0.709) indicates no significant difference between farmers’ participation in the extension services of public and private organizations but however shows significant difference (X2=12.074) in the benefits achieved by respondents in the two organizations, such benefits include: increased quantity of Crop produced, farm income, skill acquisition, and improved Education in private extension organizations. Based on this result, it could be inferred that beneficiaries generally preferred private extension organizations because of their effectiveness and vibrancy in programme administration. Public extension is therefore recommended for general overhauling and possibly “merging” of public and private sectors in order to cater for teeming population of farmers demanding for efficient and functional extension services to better their lots both in production and processing.Keywords: public and private involvement, extension services, farmers’ preferences, Kruskal Wallis Test
Procedia PDF Downloads 3317129 Food and Parasitical Outline on Balls of Raven Corvus corax tingitanus Irby, on 1874 (Aves–Corvidae) in the Public Dump of Oum El Bouaghi (Road of Guelif)
Authors: Faiza Marniche, Amel Milla, Samiha Belmania, Ahlem Fadheli, Salah Eddine Doumandji
Abstract:
Within the public dump of the region of Oum El Bouaghi across the analysis of pellets of réjection which were picked up during two years 2008 and 2009. The diet of Raven Corvus corax tingitanus is studied in relation with available food represented by insects-preys with a parasitical study, on the pellets of this species. The food stored is gotten from the public dump of Oum El Bouaghi during three seasons, we note that insects are predominant during three seasons, autumn (91.62%), winter (58.95%) and springs (77.78%). The analysis of 42 pellets of rejection collected in this station have revealed that insects dominate the diet of Raven through three seasons , the most presented family is that of the Formicidae in autumn (43.5%) and spring (24.2%) however in winter is that of family Carabidae with a percentage of 9.1%. Parasitic analysis on 30 pellets of this species has indicated the existence of three endoparasites, Isospora sp. (Protozoa-Coccidae), Eimeria sp. (Protozoa-Coccidae) and Nematoda sp.ind. (Metazoa-Nemathelmintes).Keywords: big raven Corvus corax tingitanus, public dump, Oum El Bouaghi, available food, diet, parasites
Procedia PDF Downloads 3127128 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 2997127 Analyzing the Impact of Local and International Artists in Creating Cultural Identity through Public Art: Case Study of Chicago Public Policies
Authors: Kaesha M. Freyaldenhoven
Abstract:
Chicago is a city in the United States whose cultural identity is largely shaped by public art pieces. Quintessential public works created by internationally renown artists – such as Anish Kapoor’s Cloud Gate in Millennium Park and 'The Picasso' in Daley Plaza – have historically contributed to developing a shared sense of community. In 2017, the city implemented a policy titled 50x50 Neighborhood Arts Project under the Chicago Public Art Plan. The policy promotes investments in contemporary public art to elevate neighborhood cultural assets and create a sense of place. Exclusively community-based artists were commissioned to accomplish the mission of the policy. Administrators felt only local artists would be capable of capturing the true essence of a neighborhood through art. This paper discusses the relationship between the public art and the culture of its respective neighborhood through close examination of aesthetic formal properties and social significance. Research compares the role of international artists with the role of local artists in cultivating the identity of a city through site-specific artworks in Chicago. Methodology unites theoretical research on understanding art and its function in the public space with empirical research on Chicago-based works. Theoretical frameworks provide an art historical foundation to explore the manner in which physical properties convey meaning through the work itself and its placement in an urban setting. Empirical research that examines policy documentation and press announcements released by the Department of Cultural Affairs and Special Events investigates project selection processes pertaining to the artists and neighborhoods. Ethnographies and interviews of individuals from diverse social segments in contemporary Chicago society measure impacts of the works on respective populations. Findings demonstrate works created by local artists activate neighborhoods and inculcate a sense of pride among community residents. Works created by international artists garner widespread media attention that frames the city’s cultural identity across temporal and geographic zones. This research can be utilized to inform future cultural policies pertaining to the commission of public art.Keywords: Chicago, cultural policy, public art, urban art
Procedia PDF Downloads 1277126 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union
Authors: M. Adamczak-Retecka, O. Hołub-Śniadach
Abstract:
Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.Keywords: climate change, food security, sustainable food consumption, climate governance
Procedia PDF Downloads 1797125 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 4827124 Social and Economic Challenges of Adopting Sustainable Urban Development in Developing Economy: A Stakeholder's Perception
Authors: Raed Fawzi Mohammed Ameen, Haider I. Alyasari, Maryam Altaweel
Abstract:
Due to rapid urbanization, developing countries faced significant urban challenges that accompanied the population growth such as the inability to provide adequate housing; sustain human and community's health and wellbeing; ensure the safety in urban areas; the prevalence corruption; lack of jobs; and a shortage of investment. The destruction, degradation, and lack of planning are acute in countries such as Iraq that have suffered for more than four decades because of war and international sanctions, resulting in severe damages to the ecology sector, social utilities, housing, infrastructure, as well as the disruption of the economic sector. Many of significant urban development, housing, and regeneration projects are currently underway in different regions in Iraq, labelled as a means to reform the environmental, social, and economic sectors. However, most often with absence of public participation. Hence, there is an urgent need for understanding public perception, especially of urban socio-economic challenges, which represents a crucial concern for many planners, designers, and policy-makers in order to develop effective policies in addition to increasing their participation. The aim of this study is to investigate stakeholder perceptions of the socio-economic challenges of urban development and their priorities in the all Iraqi provinces. A nationwide questionnaire has been conducted (N = 643) across Iraq, using 19- item structured questionnaire where the stakeholder’s perspectives were collected on a 5-point Likert-type scale. The indicators were identified through deep investigation in previous studies. Principal component analysis (PCA) and statistical tests were utilized to the collected responses in order to investigate the linkage between the perceptions of socio- economic challenges and demographic factors. A high value of internal consistency and reliability of the instrument has been achieved (Cronbach’s alpha= 0.867). Five principal components have been identified, namely: economic, cultural aspects, design context, employment, security and housing demands. The item ‘safety of public places' was ranked as the most important, followed by the items 'minimize unplanned housing', and ‘provision of affordable housing’, respectively. Promote high-rise housing from the housing demands group, was ranked the lowest component between all indicators. 'Using sustainable local materials in construction' item had the second lowest mean score. The results also illustrate a link between deficiencies in the social and economic infrastructure because of the destruction and degradation caused by political instability in Iraq in the last few decades.Keywords: public participation in development, socio-economic challenges, urban development, urban sustainability
Procedia PDF Downloads 1357123 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 1437122 Students’ Post COVID-19 Experiences with E-Learning Platforms among Undergraduate Students of Public Universities in the Ashanti Region, Ghana
Authors: Michael Oppong, Stephanie Owusu Ansah, Daniel Ofori
Abstract:
The study investigated students’ post-covid-19 experiences with e-learning platforms among undergraduate students of public universities in the Ashanti region of Ghana. The study respectively drew 289 respondents from two public universities, i.e., Kwame Nkrumah University of Science and Technology (KNUST) Business School and the Kumasi Technical University (KsTU) Business School in Ghana. Given that the population from the two public universities was fairly high, sampling had to be done. The overall population of the study was 480 students randomly sampled from the two public universities using the sampling ratio given by Alreck and Settle (2004). The population constituted 360 students from the Kwame Nkrumah University of Science and Technology (KNUST) Business School and 120 from the Kumasi Technical University Business School (KsTU). The study employed questionnaires as a data collection tool. The data gathered were 289 responses out of 480 questionnaires administered, representing 60.2%. The data was analyzed using pie charts, bar charts, percentages, and line graphs. Findings revealed that the e-learning platforms were still useful. However, the students used it on a weekly basis post-COVID-19, unlike in the COVID-19 era, where it was used daily. All other academic activities, with the exception of examinations, are still undertaken on the e-learning platforms; however, it is underutilized in the post-COVID-19 experience. The study recommends that universities should invest in infrastructure development to enable all academic activities, most especially examinations, to be undertaken using the e-learning platforms to curtail future challenges.Keywords: e-learning platform, undergraduate students, post-COVID-19 experience, public universities
Procedia PDF Downloads 987121 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security
Authors: Chandanee Wasana Kalansooriya
Abstract:
Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.Keywords: diabetes, food security, glycemic index, rice consumption
Procedia PDF Downloads 1027120 Understanding Perceptual Differences and Preferences of Urban Color in New Taipei City
Authors: Yuheng Tao
Abstract:
Rapid urbanization has brought the consequences of incompatible and excessive homogeneity of urban system, and urban color planning has become one of the most effective ways to restore the characteristics of cities. Among the many urban color design research, the establishment of urban theme colors has rarely been discussed. This study took the "New Taipei City Environmental Aesthetic Color” project as a research case and conducted mixed-method research that included expert interviews and quantitative survey data. This study introduces how theme colors were selected by the experts and investigates public’s perception and preference of the selected theme colors. Several findings include 1) urban memory plays a significant role in determining urban theme colors; 2) When establishing urban theme colors, areas/cities with relatively weak urban memory are given priority to be defined; 3) Urban theme colors that imply cultural attributes are more widely accepted by the public; 4) A representative city theme color helps conserve culture rather than guiding innovation. In addition, this research rearranges the urban color symbolism and specific content of urban theme colors and provides a more scientific urban theme color selection scheme for urban planners.Keywords: urban theme color, urban color attribute, public perception, public preferences
Procedia PDF Downloads 1587119 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 2067118 Opportunities and Challenges of Digital Diplomacy in the Public Diplomacy of the Islamic Republic of Iran
Authors: Somayeh Pashaee
Abstract:
The ever-increasing growth of the Internet and the development of information and communication technology have prompted the politicians of different countries to use virtual networks as an efficient tool for their foreign policy. The communication of governments and countries, even in the farthest places from each other, through electronic networks, has caused vast changes in the way of statecraft and governance. Importantly, in the meantime, diplomacy, which is always based on information and communication, has been affected by the new prevailing conditions and new technologies more than other areas and has faced greater changes. The emergence of virtual space and the formation of new communication tools in the field of public diplomacy has led to the redefinition of the framework of diplomacy and politics in the international arena and the appearance of a new aspect of diplomacy called digital diplomacy. Digital diplomacy is in the concept of changing relations from a face-to-face and traditional way to a non-face-to-face and new way, and its purpose is to solve foreign policy issues using virtual space. Digital diplomacy, by affecting diplomatic procedures and its change, explains the role of technology in the visualization and implementation of diplomacy in different ways. The purpose of this paper is to investigate the position of digital diplomacy in the public diplomacy of the Islamic Republic of Iran. The paper tries to answer these two questions in a descriptive-analytical way, considering the progress of communication and the role of virtual space in the service of diplomacy, what is the approach of the Islamic Republic of Iran towards digital diplomacy and the use of a new way of establishing foreign relations in public diplomacy? What capacities and damages are facing the country after the use of this type of new diplomacy? In this paper, various theoretical concepts in the field of public diplomacy and modern diplomacy, including Geoff Berridge, Charles Kegley, Hans Tuch and Ronald Peter Barston, as well as the theoretical framework of Marcus Holmes on digital diplomacy, will be used as a conceptual basis to support the analysis. As a result, in order to better achieve the political goals of the country, especially in foreign policy, the approach of the Islamic Republic of Iran to public diplomacy with a focus on digital diplomacy should be strengthened and revised. Today, only emphasizing on advancing diplomacy through traditional methods may weaken Iran's position in the public opinion level from other countries.Keywords: digital diplomacy, public diplomacy, islamic republic of Iran, foreign policy, opportunities and challenges
Procedia PDF Downloads 1137117 JENOSYS: Application of a Web-Based Online Energy Performance Reporting Tool for Government Buildings in Malaysia
Authors: Norhayati Mat Wajid, Abdul Murad Zainal Abidin, Faiz Fadzil, Mohd Yusof Aizad Mukhtar
Abstract:
One of the areas that present an opportunity to reduce the national carbon emission is the energy management of public buildings. To our present knowledge, there is no easy-to-use and centralized mechanism that enables the government to monitor the overall energy performance, as well as the carbon footprint, of Malaysia’s public buildings. Therefore, the Public Works Department Malaysia, or PWD, has developed a web-based energy performance reporting tool called JENOSYS (JKR Energy Online System), which incorporates a database of utility account numbers acquired from the utility service provider for analysis and reporting. For test case purposes, 23 buildings under PWD were selected and monitored for their monthly energy performance (in kWh), carbon emission reduction (in tCO₂eq) and utility cost (in MYR), against the baseline. This paper demonstrates the simplicity with which buildings without energy metering can be monitored centrally and the benefits that can be accrued by the government in terms of building energy disclosure and concludes with the recommendation of expanding the system to all the public buildings in Malaysia.Keywords: energy-efficient buildings, energy management systems, government buildings, JENOSYS
Procedia PDF Downloads 1747116 Architectural Design Strategies and Visual Perception of Contemporary Spatial Design
Authors: Nora Geczy
Abstract:
In today’s architectural practice, during the process of designing public, educational, healthcare and cultural space, human-centered architectural designs helping spatial orientation, safe space usage and the appropriate spatial sequence of actions are gaining increasing importance. Related to the methodology of designing public buildings, several scientific experiments in spatial recognition, spatial analysis and spatial psychology with regard to the components of space producing mental and physiological effects have been going on at the Department of Architectural Design and the Interdisciplinary Student Workshop (IDM) at the Széchenyi István University, Győr since 2013. Defining the creation of preventive, anticipated spatial design and the architectural tools of spatial comfort of public buildings and their practical usability are in the limelight of our research. In the experiments applying eye-tracking cameras, we studied the way public spaces are used, especially concentrating on the characteristics of spatial behaviour, orientation, recognition, the sequence of actions, and space usage. Along with the role of mental maps, human perception, and interaction problems in public spaces (at railway stations, galleries, and educational institutions), we analyzed the spatial situations influencing psychological and ergonomic factors. We also analyzed the eye movements of the experimental subjects in dynamic situations, in spatial procession, using stairs and corridors. We monitored both the consequences and the distorting effects of the ocular dominance of the right eye on spatial orientation; we analyzed the gender-based differences of women and men’s orientation, stress-inducing spaces, spaces affecting concentration and the spatial situation influencing territorial behaviour. Based on these observations, we collected the components of creating public interior spaces, which -according to our theory- contribute to the optimal usability of public spaces. We summed up our research in criteria for design, including 10 points. Our further goals are testing design principles needed for optimizing orientation and space usage, their discussion, refinement, and practical usage.Keywords: architecture, eye-tracking, human-centered spatial design, public interior spaces, visual perception
Procedia PDF Downloads 1117115 Impact of Exogenous Risk Factors into Actual Construction Price in PPP Projects
Authors: Saleh Alzahrani, Halim Boussabaine
Abstract:
Many of Public Private Partnership (PPP) are developed based on a public project is to be awarded to a private party within a one contractual framework. PPP project risks typically include the development and construction of a new asset as well as its operation. Certainly the most severe consequences of risks through the construction period are price and time overruns. These events are among the most generally used situation in value for money analysis risks. The sources of risk change during the time in PPP project. In traditional procurement, the public sector usually has to cover all prices suffering from these risks. At least there is plenty to suggest that price suffering is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of exogenous risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.Keywords: public private partnership (PPP), risk, risk pricing, system dynamics (SD)
Procedia PDF Downloads 5577114 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 5187113 Access to Climate Change Information Through the Implementation of the Paris Agreement
Authors: Ana Cristina A. P. Carvalho, Solange Teles Da Silva
Abstract:
In April, 174 countries signed the Paris Agreement, a multilateral agreement on climate change which deals with greenhouse gas emissions, mitigation, adaptation, finance, access to information, transparency, among other subjects related to the environment. Since then, Parties shall cooperate in taking measures, as appropriate, to enhance climate change education, training, public awareness, public participation and public access to information, recognizing the importance of these steps with respect to enhancing actions under this Agreement. This paper aims to analyze the consequences of this new rule in terms of the implementation of the Agreement, collecting data from Brazilian and Canadian legislations in order to identify if these countries have rules complying with the Treaty, the steps that have been already taken and if they could be used as examples for other countries. The analysis will take into consideration the different kinds of climate change information, means of transparency, reliability of the data and how to spread the information. The methodology comprehends a comparative legal research based on both the Paris Agreement and domestic laws of Brazil and Canada, as well as on doctrine and Court decisions. The findings can contribute to the implementation of the Paris Agreement through compliance with this Treaty at countries’ domestic and policy level.Keywords: climate change information, domestic legislation, Paris Agreement, public policy
Procedia PDF Downloads 3097112 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 1727111 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 627110 The Lived Experience of Siblings of Autistic Children; From the Private to Public Sphere
Authors: Kiana Taghikhan, Shamim Sherafat, Mostafa Taheri
Abstract:
Although many people with autism spectrum disorder around the world face many problems and challenges, their conditions may unintentionally affect the lives of the people around them. In this research the experiences of siblings of autistic children have been investigated in both the public and private spheres of their lives. "Private sphere" includes the experiences of research participants in socializing with relatives and family, assignments and responsibilities, as well as how they spend their leisure time and lifestyle. The "public sphere" includes the experience of their presence in society, such as university, or workplace and any outdoor activities that could have been affected by their sibling’s disorder. The present research has been done using the qualitative research method and in-depth interview technique with siblings of autistic children. The sample population is 15 individuals who participated in the research theoretically and purposefully. Based on the findings, the private and social experiences of these individuals is very different compared to peers who do not have siblings with autism disorder in the family. The difference is to such an extent that causes them to separate and distance themselves from other members of the society, and depending on their special conditions, it can affect their goals and life opportunities such as job, marriage, having children, etc.Keywords: autism spectrum disorder, siblings, private sphere, public sphere
Procedia PDF Downloads 297109 The Implementation of Human Resource Information System in the Public Sector: An Exploratory Study of Perceived Benefits and Challenges
Authors: Aneeqa Suhail, Shabana Naveed
Abstract:
The public sector (in both developed and developing countries) has gone through various waves of radical reforms in recent decades. In Pakistan, under the influence of New Public Management(NPM) Reforms; best practices of private sector are introduced in the public sector to modernize public organizations. Human Resource Information System (HRIS) has been popular in the private sector and proven to be a successful system, therefore it is being adopted in the public sector too. However, implementation of private business practices in public organizations us very challenging due to differences in context. This implementation gets further critical in Pakistan due to a centralizing tendency and lack of autonomy in public organizations. Adoption of HRIS by public organizations in Pakistan raises several questions: What challenges are faced by public organizations in implementation of HRIS? Are benefits of HRIS such as efficiency, process integration and cost reduction achieved? How is the previous system improved with this change and what are the impacts? Yet, it is an under-researched topic, especially in public enterprises. This study contributes to the existing body of knowledge by empirically exploring benefits and challenges of implementation of HRIS in public organizations. The research adopts a case study approach and uses qualitative data based on in-depth interviews conducted at various levels in the hierarchy including top management, departmental heads and employees. The unit of analysis is LESCO, the Lahore Electric Supply Company, a state-owned entity that generates, transmits and distributes electricity to 4 big cities in Punjab, Pakistan. The findings of the study show that LESCO has not achieved the benefits of HRIS as established in literature. The implementation process remained quite slow and costly. Various functions of HR are still in isolation and integration is a big challenge for the organization. Although the data is automated, the previous system of manually record maintenance and paperwork is still in work, resulting in the presence of parallel practices. The findings also identified resistance to change from top management and labor workforce, lack of commitment and technical knowledge, and costly vendors as major barriers that affect the effective implementation of HRIS. The paper suggests some potential actions to overcome these barriers and to enhance effective implementation of HR-technology. The findings are explained in light of an institutional logics perspective. HRIS’ new logic of automated and integrated HR system is in sharp contrast with the prevailing logic of process-oriented manual data maintenance, leading to resistance to change and deadlock.Keywords: human resource information system, technological changes, state-owned enterprise, implementation challenges
Procedia PDF Downloads 1447108 Working Hours of Nurses in Public Hospitals: An Analyse Based on Working Schedules
Authors: Feride Eskin Bacaksiz, Arzu K. Harmanci Seren
Abstract:
The problems about the working hours of nursing personnel, such as overworking, numbers of night or daytime shifts, is stated one of the most complained issues by nurses. Otherwise, besides of nursing shortage, absenteeism of nurses because of sickness, some other health problems, or other reasons enforces nurse managers to make working schedules. In this study, it was aimed to analyse and evaluate the working schedules of nurses working in public hospitals. Working schedule lists of nursing personnel for the months of October and November in two public hospitals were analysed and evaluated. Approvals were acquired from the head nurse managers. Descriptive and comparative analyses were used. Totally 36 lists were analysed from two hospitals. There were totally 416 nurses (manager nurse: 25, nurse: 391) and 6-28 (12.6, SD=5.34) nurses in each list. It was found that nurses were working 8 (42.5%), 12 (27.9%) and 16 (20%) hours, in inpatient clinics (74.8%). Totally 20.2% of the nurses were absent during analysing time due to the annual, paid or unpaid leaves. Nurses were generally working 20-112 hours (80.27, SD=11.92). Most of the nurses over worked 1.5-443 hours (47.436, SD=60.78) the year before that year. It was determined that 11.8% of the nurses (n: 49) were working only night shifts and 42.1% (n: 175) of the nurses were working only daytime shifts. It was found that there were inequities in the working hours of nurses.Keywords: nurse, public hospitals, working conditions, working schedules
Procedia PDF Downloads 2837107 Informal Governance as Response to Institutional Paralysis
Authors: Stefanie Kasparek
Abstract:
The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.Keywords: agenda-setting, decision-making, international governance, UNSC
Procedia PDF Downloads 1997106 Employee Perception of Corporate Social Responsibility and Its Impact on Organizational Performance: Evidence from the UAE
Authors: Sherine Farouk, Fauzia Jabeen
Abstract:
The purpose of this study is to examine the role played by ethical climate and CSR on organizational performance in public sector organizations. In particular, the research will shed light on the link between formalized ethical procedures and employee responses including corporate social responsibility, and organizational performance among public sector employees. Data was collected from 425 employees working in public sector organizations in Abu Dhabi, the capital of United Arab Emirates. Structural Equation Modeling will be used to test the proposed hypotheses. The paper contributes to the literature by being one of the first to study CSR and ethical climate within a Middle Eastern context, and will offer important implications for theory and practice.Keywords: corporate social responsibility, ethical climate, organizational performance, United Arab Emirates
Procedia PDF Downloads 3447105 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security
Authors: Temitope Francis Abiodun
Abstract:
The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.Keywords: terrorism, non-violent state actors, private sector intelligence, security
Procedia PDF Downloads 1377104 Mobile Cloud Computing: How to Improve
Authors: Abdullah Aljumah, Tariq Ahamad
Abstract:
The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.Keywords: Cloud Computing, MCC, SAAS, computer interaction
Procedia PDF Downloads 381