Search results for: state security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9533

Search results for: state security

8423 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 85
8422 Consensus, Federalism and Inter-State Water Disputes in India

Authors: Amrisha Pandey

Abstract:

Indian constitution has distributed the powers to govern and legislate between the centre and the state governments based on the list of subject-matter provided in the seventh schedule. By that schedule, the states are authorized to regulate the water resource within their territory. However, the centre/union government is authorized to regulate the inter-state water disputes. The powers entrusted to the union government mainly deals with the sharing of river water which flows through the territory of two or more states. For that purpose, a provision enumerated in Article 262 of the Constitution of India which empowers the parliament to resolve any such inter-state river water dispute. Therefore, the parliament has enacted the - ‘Inter-State River Water Dispute Tribunal, Act’, which allows the central/union government to constitute the tribunal for the adjudication of the disputes and expressly bars the jurisdiction of the judiciary in the concerned matter. This arrangement was intended to resolve the dispute using political or diplomatic means, without deliberately interfering with the sovereign power of the states to govern the water resource. The situation in present context is complicated and sensitive. Due to the change in climatic conditions; increasing demand for the limited resource; and the advanced understanding of the freshwater cycle, which is missing from the existing legal regime. The obsolete legal and political tools, the existing legislative mechanism and the institutional units do not seem to accommodate the rising challenge to regulate the resource. Therefore, resulting in the rise of the politicization of the inter-state water disputes. Against this background, this paper will investigate the inter-state river water dispute in India and will critically analyze the ability of the existing constitutional, and institutional units involved in the task. Moreover, the competence of the tribunal as the adjudicating body in present context will be analyzed using the long ongoing inter-state water dispute in India – The Cauvery Water Dispute, as the case study. To conduct the task undertaken in this paper the doctrinal methodology of the research is adopted. The disputes will also be investigated through the lens of sovereignty, which is accorded to the states using the theory of ‘separation of power’ and the ‘grant of internal sovereignty’, to its federal units of governance. The issue of sovereignty in this paper is discussed in two ways: 1) as the responsibility of the state - to govern the resource; and 2) as the obligation of the state - to govern the resource, arising from the sovereign power of the state. Furthermore, the duality of the sovereign power coexists in this analysis; the overall sovereign authority of the nation-state, and the internal sovereignty of the states as its federal units of governance. As a result, this investigation will propose institutional, legislative and judicial reforms. Additionally, it will suggest certain amendments to the existing constitutional provisions in order to avoid the contradictions in their scope and meaning in the light of the advanced hydrological understanding.

Keywords: constitution of India, federalism, inter-state river water dispute tribunal of India, sovereignty

Procedia PDF Downloads 143
8421 Institutional Capacity and Corruption: Evidence from Brazil

Authors: Dalson Figueiredo, Enivaldo Rocha, Ranulfo Paranhos, José Alexandre

Abstract:

This paper analyzes the effects of institutional capacity on corruption. Methodologically, the research design combines both descriptive and multivariate statistics to examine two original datasets based on secondary data. In particular, we employ a principal component model to estimate an indicator of institutional capacity for both state audit institutions and subnational judiciary courts. Then, we estimate the effect of institutional capacity on two dependent variables: (1) incidence of administrative irregularities and (2) time elapsed to judge corruption cases. The preliminary results using ordinary least squares, negative binomial and Tobit models suggest the same conclusions: higher the institutional audit capacity, higher is the probability of detecting a corruption case. On the other hand, higher the institutional capacity of state judiciary, the lower is the time to judge corruption cases.

Keywords: institutional capacity, corruption, state level institutions, evidence from Brazil

Procedia PDF Downloads 357
8420 Effects of Internet Addiction on Students’ Academic Performance among Some Tertiary Institutions in Oyo State, Nigeria

Authors: Mujidat Lola Olugbode

Abstract:

This study investigates the effects of internet addiction on academic performance among students in some tertiary institutions in Oyo State, Nigeria. A descriptive survey research design was adopted for the study. Two research questions and two hypotheses were answered and tested. The population of the study comprised of all students in five tertiary institutions in Oyo State, Nigeria. Simple random sampling technique was used to select 2550 participants (respondents) from the institutions used for the study, this constituted the sample for the study. The instruments used for data collection was a self-constructed questionnaire on Internet Addiction and Students Academic Performance (IAASAP). The reliability coefficient of the instrument was 0.77. Data collected were analyzed using frequency and percentages, Pearson Product Moment Correlation coefficient (PPMCC) and t-test analysis. The results showed that the students in tertiary institutions in Oyo State were occasionally addicted to internet use. The study also revealed a positive correlation between internet addiction and academic performance. The findings also showed that there was significant difference in the internet addiction between male and female Students. Based on the above findings, the researchers recommended among others that government, educators, parents, counselors, teachers should help redirect the internet use toward academics to ensure greater academic performance.

Keywords: internet, addiction, internet addiction, academic performance, tertiary institution, students

Procedia PDF Downloads 54
8419 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 353
8418 Solar Technology: A Review of Government-Sponsored Green Energy

Authors: Christopher Battle

Abstract:

The pursuit of a sustainable future is dependent on the ability of governments from the national to municipal level. The politics of energy and the development of state-sponsored photovoltaic cell expansion can nebulize in several ways based on a state or nation's physical and human geography. This study conducts a comparative analysis of the energy and solar program of Turkey, Pennsylvania, and Philadelphia. The study aims to assess the city of Philadelphia's solar policies in contrast with both its political history and the photovoltaic programs of Turkey, a world leader in solar system development, and Pennsylvania's history of energy regulation. This comparative study found that after hundreds of bills and regulations over decades, sustainable energy development in affordable housing and new construction is the next phase of State-Sponsored Green energy for the city of Philadelphia.

Keywords: Turkey, solar power, Philadelphia, affordable energy development

Procedia PDF Downloads 87
8417 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 299
8416 Characteristics of GaAs/InGaP and AlGaAs/GaAs/InAlGaP Npn Heterostructural Optoelectronic Switches

Authors: Der-Feng Guo

Abstract:

Optoelectronic switches have attracted a considerable attention in the semiconductor research field due to their potential applications in optical computing systems and optoelectronic integrated circuits (OEICs). With high gains and high-speed operations, npn heterostructures can be used to produce promising optoelectronic switches. It is known that the bulk barrier and heterostructure-induced potential spike act important roles in the characteristics of the npn heterostructures. To investigate the effects of bulk barrier and potential spike heights on the optoelectronic switching of the npn heterostructures, GaAs/InGaP and AlGaAs/GaAs/InAlGaP npn heterostructural optoelectronic switches (HSOSs) have been fabricated in this work. It is seen that the illumination decreases the switching voltage Vs and increases the switching current Is, and thus the OFF state is under dark and ON state under illumination in the optical switching of the GaAs/InGaP HSOS characteristics. But in the AlGaAs/GaAs/InAlGaP HSOS characteristics, the Vs and Is present contrary trends, and the OFF state is under illumination and ON state under dark. The studied HSOSs show quite different switching variations with incident light, which are mainly attributed to the bulk barrier and potential spike heights affected by photogenerated carriers.

Keywords: bulk barrier, heterostructure, optoelectronic switch, potential spike

Procedia PDF Downloads 231
8415 Packaging and Promotion of Local Handcraft for Tourism Growth and Development in Osun State (A Study of Olumirin Waterfall, Erin Ijesa and Osun Osogbo Grove, Osogbo, Osun State, Nigeria)

Authors: Chukwu J. C., Elujoba E. T., AjaniI A. A., Aiyegbayo O. O.

Abstract:

Handcrafts form an integral part of the tourist experience, they represent local traditions and indigenous populations and also as valuable souvenir. The local craft sector is performing at a level far below its potential as a tourism product, hence, this paper seek to examine the challenges facing local handcraft development and suggest ways to promote and package them as souvenirs in tourist destinations in Osun state. One hundred and sixty (160) questionnaires were administered to the staffers and tourists in Osun Osogbo grove and Erin Ijesa waterfall, both in Osun state and 120 questionnaires were properly filled and returned, which gives 75% return rate. Cronbach’s Alpha was used to test the reliability of the research instrument. The findings of the study revealed that ( F_((1,118))= 2.070, r = .151, Sig.< 0.05) there exist a weak and positive relationship between local craft development and the overall development of tourist destinations in Osun state, Nigeria. Therefore, it was concluded, among others, that a lot needs to be done on packaging and promotion of the local handcraft since it was found to have a significant impact on the development of tourist destinations. This, in return, will increase the popularity and acceptability of handcraft both at home and abroad. The study recommends, among others, that government should establish a tourism entrepreneurial development centre charged with the responsibilities of creating and identifying tourism business opportunities and act as ‘one stop shop’ to purchase a local souvenir and disseminate information to potential tourist cum entrepreneurs in the tourism industry.

Keywords: packaging, promotion, handcraft, tourism, development

Procedia PDF Downloads 103
8414 Aesthetics, Freedom and State in Hegel’s Philosophy

Authors: Akbar Jamali

Abstract:

Many scholars consider Hegel’s philosophy of art as the greatest theory of aesthetics since Aristotle’s Poetics. ‘Freedom’ distinguishes modern, especially German Idealism with Greek philosophy. Therefore, introducing and contemplating on Hegel’s Aesthetics as a whole, freedom as the essence of art, Hegel’s controversial claim on the end of art, and the relation of art and state is the main theme of this study. Hegel’s aesthetics is to be understood in his whole system. According to Hegel’s speculative philosophy, being is to be understood as self-determining Reason or Idea. The self-determining Reason actualizes and realizes himself in the course of history. Idea in the process of self-actualization becomes more and more rational. It first actualizes itself in matter, then in non-conscious life, finally in conscious and self-conscious life. Self-conscious life is the most rational stage of development of Idea in which the subject can think and imagine, use language and exercise freedom. Hegel calls this self-conscious life Spirit (Geist). Therefore, emergence of human being is an essential moment in the process of self-determination of Reason. It is not accidental rather a necessity. The essence of spirit is freedom. Since the history is the process of the self-actualization if spirit, humankind becomes more and more, free. Spirit in its ‘Absolute’ form manifests itself into three forms; Art, Religion and philosophy. Art is the first stage in which Spirit understands itself. In fact, Art is the expression of human spirit, which is comprehended by our senses. Beauty is defined as the sensuous expression of free Spirit. The purpose of art is, therefore, to express, enjoy and contemplate on our freedom. State belongs to the realm of Objective spirit, while Art along with Religion and philosophy belong to the realm of Absolute Spirit. Absolute spirit is superior to Objective Spirit; therefore, state must not interfere in the realm of art. Limitation on art by state directly violates freedom and prevents development of national spirit. Genuine art leads us to freedom and richness of (national) Spirit. Using Hegel’s philosophy of art, we can comprehend why totalitarian states try to limit art and, why artists are the enemy of totalitarian states. In this philosophical system, we contemplate on art as a way to freedom and emancipation.

Keywords: aesthetics, freedom, spirit, state

Procedia PDF Downloads 281
8413 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 252
8412 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 206
8411 Non-Homogeneity in a Thick Walled Rotating Circular Cylinder under Varying Pressure

Authors: Jatinder Kaur, Pankaj Thakur

Abstract:

The effect of pressure and temperature in non-homogeneous circular cylinder by taking non-homogeneity of material in terms of compressibility c=c₀r⁻ᵏ has been observed. From the results, it could be seen that for K<0, high pressure is required in the initial yielding state than for the case K >0. Under thermal conditions for value K<0, lesser amount of pressure is required for initial yielding, and further, the amount keeps on decreasing with an increase in temperature. Curves are drawn between pressure and radii ratio for initial and fully plastic state with and without temperature conditions. Further graphs between stresses (hoop and radial) and radii ratio for fully plastic state with and without temperature conditions are also drawn and concluded that hoop stresses become minimum with the increase in temperature as compared to radial stresses.

Keywords: cylinder, elastic, plastic, copper, steel, stresses, pressure, load

Procedia PDF Downloads 71
8410 The Sustainability of Health and Safety on Construction Sites in Zamfara State

Authors: Ismaila Oladunni Muhammed, Adegbenga Raphael Ashiru

Abstract:

Construction industry has been attributed to be the engine growth of Nigerian economic and infrastructural development. It promotes infrastructural development and grows an average output of Nigerian Gross Domestic Profit. However, from this great prospect, yearly reports show that consistent accidents on construction sites in Zamfara State has affected a substantial number of workers as they become temporarily or permanently disabled, thereby making many construction sites a death trap. This posed a great threat to the industry’s sustainability, de- motivate workers from working in the industry, and further have negative impact on the economy as well. It is as a result of high construction site accident currently experiencing in Zamfara state that this research was carried out to appraise the sustainability of health and safety of construction workers on sites. The proper practice and compliance to Construction Health and safety laws are very vital to the output and growth of Zamfara State construction sector. However, a quantitative approach was adopted to justify the aforesaid statement which will provide a broader understanding of the study. Descriptive statistical analysis was obtained through Statistical Package for the Social Sciences (SPSS Version 20). Furthermore, the findings from the research highlighted that the performance and output of construction workers on construction sites depends on the proper practice of health and safety. The research findings also recommended ways to enhance employers and employee’s compliance with existing laws guiding health and safety on Zamfara State construction sites. Nevertheless, the purpose of the paper is to appraise the sustainability of Health and Safety on Zamfara State construction sites. This study further provided thorough information for resolving challenges of construction sites accidents to improve construction firm productivity and also ensured construction worker’s safety on site.

Keywords: construction industry, health and safety regulations, causes of accident, construction safety practices

Procedia PDF Downloads 206
8409 Federalism, a System of Government: Comparative Study of Australia and Canada

Authors: Rana Tajammal Rashid

Abstract:

Federalism is a political system in which government power and responsibility are divided between a federal legislature and units of the state or provincial legislatures. This system provides the structure for the states having large territory and through that can manage the state affairs and administration easily. Many of the largest countries in the world are federations, like; The United States, Canada, India, Pakistan South Africa, Argentina, and Australia. Every large democratic nation has a federal system of government. This study will explore the feature and good governance of two developed countries Canada and Australia. This study will be helpful to the developing countries like Pakistan, India which have a federal form of structure to run the affairs of the state. In the federal system of Pakistan there are lot of issues and conflicts with the provinces with a comparative study of these two developed countries, i.e., Australia and Canada, our policy and decision maker political actors will understand in which way a state will successfully manage the issues related to federalism. This study will also provide the help to the students of comparative politics that how to analysis the different political system of the developed countries of the world.

Keywords: federalism, features of federalism, types of federalism, history of federalism, Australian federalism, Canadian federalism, federalism developments, executives, federal and provincial autonomy legislative, judicial

Procedia PDF Downloads 277
8408 The Political Economy of Police Corruption in Nigeria

Authors: Tosin Osasona

Abstract:

The Nigeria Police Force bears the constitutional mandate as the primary policing agency for the protection of life and property within Nigeria; however, the police have an historical ill-reputation for corruption, ineptitude and impunity. Using the institutional theory of police as the framework of analysis, the paper argues that the performance of the police in Nigeria mirrors the dominant political, social and economic institutions and the structural environment of the Nigerian state. The article puts in perspective the deliberate political decision to underfund the police, leaving officers of the force the extra task of foraging for funds to undertake the duty that the Nigeria state primarily exists for; the article further explores the nexus between corruption in the police in Nigeria and the issue of funding. The article finds that the Nigerian state, by deliberately under-funding the police, while expecting the agency to perform its duties, has indirectly sanctioned the corruption of the force and approved the cooption of the institution of police and policing for private use in Nigeria.

Keywords: Police Corruption, Funding , Informal Taxation, POlice Checkpoint

Procedia PDF Downloads 145
8407 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 311
8406 Ethnography of Lamentation: Azadari as It Exists in the Tri-State Shi'i Community and Its Future in the American Milieu

Authors: Safi Haider

Abstract:

This work seeks to understand the fundamental mourning ceremonies termed azadari in the tristate Shi’i community. Azadari, a name derived from the Arabic aza (mourning) and the Persian dari (commemoration) as it exists in the Tri-State Shi'i community has a unique relation to the hearts and minds of its adherents. It shows the development of the community from the various perspective offered by the participants of this work. This work seeks to analyze Azadari in the light of the Tri-State Shi'i community, which is a deeply diverse community, consisting of immigrants from various other countries, including Pakistan, India, Iran, and the Arab communities. At its heart, this work is an ethnography, it seeks to know the experience of those who are a part of the Muharram commemorations and it seek to see what the underlying psychological and the social foundations of Azadari are. Five people from each of the four communities were interviewed, and the aim was to have at least two men, two women, two youth, two elders, and one person from either of these categories. What was found was that the Shi’i community is scarcely a monolith in its mourning practices, and there is a great difference not only when comparing one cultural community to another, but also within the communities as well. This work seeks to analyze azadari from the various perspective of the Shi’i community in the tri-state area. This work seeks to analyze interviews from twenty people in total: two men, two women, two youth, and two adults from each of the communities of the Shi’i of the tristate area, for a total of twenty people. Two Priests were also interviewed for the sake of the paper as well.

Keywords: Ashura, Imam Husayn, Islam, Muharram, Shi'i

Procedia PDF Downloads 128
8405 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 154
8404 Gender Supportive Systems-Key to Good Governance in Agriculture: Challenges and Strategies

Authors: Padmaja Kaja, Kiran Kumar Gellaboina

Abstract:

A lion’s share of agricultural work is contributed by women in India as it is the case in many developing countries, yet women are not securing the pride as a farmer. Many policies are supporting women empowerment in India, especially in agriculture sector considering the importance of sustainable food security. However these policies many times failed to achieve the targeted results of mainstreaming gender. Implementing the principles of governance would lead to gender equality in agriculture. This paper deals with the social norms and obligations prevailed with reference to Indian context which abstain women from having resources. This paper is formulated by using primary research done in eight districts of Telangana and Andhra Pradesh states of India supported by secondary research. Making amendments to Hindu Succession Act in united Andhra Pradesh much prior to the positioning of the amended act in the whole country lead to a better land holding a share of women in Andhra Pradesh. The policies like registering government distributed lands in the name of women in the state also have an added value. However, the women participation in decision-making process in agriculture is limited in elite families when compared to socially under privileged families, further too it was higher in drought affected districts like Mahbubnagar in Telangana when compared to resource-rich East Godavari district in Andhra Pradesh. Though National Gender Resource Centre for Agriculture (NGRCA) at centre and Gender Cells in the states were established a decade ago, extension reach to the women farmers is still lagging behind. Capturing the strength of women self groups in India especially in Andhra Pradesh to link up with agriculture extension might improve the extension reach of women farmers. Maintenance of micro level women data sets, creating women farmers networks with government departments like agriculture, irrigation, revenue and formal credit institutes would result in good governance to mainstream gender in agriculture. Further to add that continuous monitoring and impact assessments of the programmes and projects for gender inclusiveness would reiterate the government efforts.

Keywords: food security, gender, governance, mainstreaming

Procedia PDF Downloads 239
8403 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 64
8402 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 125
8401 An Assessment of the Impact of Safe Motherhood Initiative on Maternal Health of Women in Gumel Local Government Area of Jigawa State, Nigeria

Authors: Ahmed Mudi, Bala Zakar

Abstract:

The paper assesses the impact of safe motherhood initiative on maternal health of women in Gumel Local Government Area of Jigawa State. The work will specifically concentrate on the background on safe motherhood scheme and maternal health of women. The objective of this paper is to assess the level of safe motherhood scheme in Gumel local government area, to find out the level of maternal health in Gumel local government as well as to determine the impact of safe motherhood scheme on maternal health on women in Gumel Local Government Area Jigawa State. Various literature on the topic are reviewed, the paper adopts survey design and use questionnaire to collect data from the respondent. The study comprises 350 women selected from six rural communities in Gumel using random sampling techniques, and the data was analysed by simple frequency and percentage. The research concluded that safe motherhood initiative has a significant impact on the maternal health of women in Gumel Local Government Area of Jigawa State. Finally, suitable recommendations were given on how to improve the scheme to ensure better maternal health in the region.

Keywords: action, assessment, maternal health, safe motherhood, surgery

Procedia PDF Downloads 256
8400 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 207
8399 Robust Model Predictive Controller for Uncertain Nonlinear Wheeled Inverted Pendulum Systems: A Tube-Based Approach

Authors: Tran Gia Khanh, Dao Phuong Nam, Do Trong Tan, Nguyen Van Huong, Mai Xuan Sinh

Abstract:

This work presents the problem of tube-based robust model predictive controller for a class of continuous-time systems in the presence of input disturbances. The main objective is to point out the state trajectory of closed system being maintained inside a sequence of tubes. An estimation of attraction region of the closed system is pointed out based on input state stability (ISS) theory and linearized model in each time interval. The theoretical analysis and simulation results demonstrate the performance of the proposed algorithm for a wheeled inverted pendulum system.

Keywords: input state stability (ISS), tube-based robust MPC, continuous-time nonlinear systems, wheeled inverted pendulum

Procedia PDF Downloads 211
8398 A Comparative Study of the Modeling and Quality Control of the Propylene-Propane Classical Distillation and Distillation Column with Heat Pump

Authors: C. Patrascioiu, Cao Minh Ahn

Abstract:

The paper presents the research evolution in the propylene – propane distillation process, especially for the distillation columns equipped with heat pump. The paper is structured in three parts: separation of the propylene-propane mixture, steady state process modeling, and quality control systems. The first part is dedicated to state of art of the two distillation processes. The second part continues the author’s researches of the steady state process modeling. There has been elaborated a software simulation instrument that may be used to dynamic simulation of the process and to design the quality control systems. The last part presents the research of the control systems, especially for quality control systems.

Keywords: absorption, distillation, heat pump, Unisim design

Procedia PDF Downloads 327
8397 Study of Performance Based Parameters on Sprint Interval Training and Steady State Run: Trained Young Female

Authors: Abdul Latif Shaikh, Osama Kattos

Abstract:

Purpose: The study compared the effects of intra and inter group short duration intensity training and long duration steady state-run training on the cardiovascular performance on female athletes. Method: Twenty trained young female athletes age between 17 to 20 years were randomly selected to participate in the test. The sprint interval training (n-10) program consisted of 5 min sprints and steady state run (n-10) conducted for 30 min. Both groups completed eight sessions of training within four weeks. Result: In intragroup distribution of mean % change in all the variables from week 4 to week 1 did not differ significantly (p-value > 0.05). The inter-group means value of post resting heart rate, max oxygen consumption (VO2max), and calorie expenditure in sprint interval training was higher with compared with steady state run. Conclusion: The comparative mean value of the intergroups program concludes that the SIT program is superior to SSR in performance-based variables in trained young females. The SIT program can be applied as a time-efficient program for improving performance.

Keywords: calorie expenditure, maximum rate of oxygen consumption, post recovery HR (1-4-7 min), time domain

Procedia PDF Downloads 164
8396 The Regionalism Paradox in the Fight against Human Trafficking: Indonesia and the Limits of Regional Cooperation in ASEAN

Authors: Nur Iman Subono, Meidi Kosandi

Abstract:

This paper examines the role of regional cooperation in the Association of Southeast Asian Nations (ASEAN) in the fight against human trafficking for Indonesia. Many among scholars suggest that regional cooperation is necessary for combating human trafficking for its transnational and organized character as a crime against humanity. ASEAN members have been collectively active in responding transnational security issues with series of talks and collaboration agreement since early 2000s. Lately in 2015, ASEAN agreed on ASEAN Convention against Trafficking in Persons, particularly Women and Children (ACTIP) that requires each member to collaborate in information sharing and providing effective safeguard and protection of victims. Yet, the frequency of human trafficking crime occurrence remains high and tend to increase in Indonesian in 2017-2018. The objective of this paper is to examine the effectiveness and success of ACTIP implementation in the fight against human trafficking in Indonesia. Based on two years of research (2017-2018) in three provinces with the largest number of victims in Indonesia, this paper shows the tendency of persisting crime despite the implementation of regional and national anti-trafficking policies. The research was conducted by archive study, literature study, discourse analysis, and depth interviews with local government officials, police, prosecutors, victims, and traffickers. This paper argues that the relative success of ASEAN in establishing convention at the high-level meetings has not been followed with the success in its implementation in the society. Three main factors have contributed to the ineffectiveness of the agreements, i.e. (1) ASEAN institutional arrangement as a collection of sovereign states instead of supranational organization with binding authority; (2) the lack of commitment of ASEAN sovereign member-states to the agreements; and (3) the complexity and variety of the nature of the crime in each member-state. In effect, these factors have contributed to generating the regionalism paradox in ASEAN where states tend to revert to national policies instead of seeking regional collective solution.

Keywords: human trafficking, transnational security, regionalism, anti trafficking policy

Procedia PDF Downloads 144
8395 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 176
8394 Production of Biodiesel Using Tannery Fleshing as a Feedstock via Solid-State Fermentation

Authors: C. Santhana Krishnan, A. M. Mimi Sakinah, Lakhveer Singh, Zularisam A. Wahid

Abstract:

This study was initiated to evaluate and optimize the conversion of animal fat from tannery wastes into methyl ester. In the pre-treatment stage, animal fats feedstock was hydrolysed and esterified through solid state fermentation (SSF) using Microbacterium species immobilized onto sand silica matrix. After 72 hours of fermentation, predominant esters in the animal fats were found to be with 83.9% conversion rate. Later, esterified animal fats were transesterified at 3 hour reaction time with 1% NaOH (w/v %), 6% methanol to oil ratio (w/v %) to produce 89% conversion rate. C13 NMR revealed long carbon chain in fatty acid methyl esters at 22.2817-31.9727 ppm. Methyl esters of palmitic, stearic, oleic represented the major components in biodiesel.

Keywords: tannery wastes, fatty animal fleshing, trans-esterification, immobilization, solid state fermentation

Procedia PDF Downloads 258