Search results for: income security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4355

Search results for: income security

3215 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 31
3214 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 349
3213 Meat Products Demand in Oyo West Local Government: An Application of Almost Ideal Demand System (LA/AIDS)

Authors: B. A. Adeniyi, S. A. Daud, O. Amao

Abstract:

The study investigates consumer demand for meat products in Oyo West Local Government using linear approximate almost ideal demand system (LA/AIDS). Questions that were addressed by the study include: first, what is the type and quantity of meat products available to the household and their demand pattern? Second is the investigation of the factors that affect meat products demand pattern and proportion of income that is spent on them. For the above purpose cross-sectional data were collected from 156 households of the study area and analyzed to reveal the functional relationship between meat products consumption and some socio-economic variables of the household. Results indicated that per capita meat consumption increased as household income and education increased but decreased with age. It was also found that male tend to consume more meat products than their female counterparts and that increase in household size will first increased per caput meat consumption but later decreased it. Price also tends to greatly influence the demand pattern of meat products. The results of elasticity computed from the results of regression analysis revealed that own price elasticity for all meat products were negative which indicated that they were normal products while cross and expenditure elasticity were positive which further confirmed that meat products were normal and substitute products. This study therefore concludes that the relevance of these variables imposed a great challenge to the policy makers and the government, in the sense that more cost effective methods of meat production technology have to be devised in other to make consumption of meat products more affordable.

Keywords: meat products, consumption, animal production, technology

Procedia PDF Downloads 248
3212 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 36
3211 A Study of Cost and Revenue Earned from Tourist Walking Street Activities in Songkhla City Municipality, Thailand

Authors: Weerawan Marangkun

Abstract:

This study is a survey intended to investigate cost, revenue and factors affecting changes in revenue and to provide guidelines for improving factors affecting changes in revenue from tourist walking street activities in Songkhla City Municipality. Instruments used in this study were structured interviews, using Yaman table (1973) where the random sampling error was+ 10%. The sample consisting of 83 entrepreneurs were drawn from a total population of 272. The purposive sampling method was used. Data were collected during the 6-month period from December 2011 until May 2012. The findings indicate that the cost paid by an entrepreneur in connection with his/her services for tourists is mainly for travel, which stands at about 290 Baht per day. Each entrepreneur earns about 3,850 Baht per day, which means about 400,000 Baht per year. The combined total revenue from walking street tourist activities is about 108.8 million Baht per year. Such activities add economic value to tourist facilities due to expenditures by tourists and provide the entrepreneurs with considerable income. Factors affecting changes in revenue from tourist walking street activities are: the increase in the number of entrepreneurs; the holding of trade fairs, events or interesting shows in the vicinity; and weather conditions (e.g. abundant rainfall, which can contribute to a decrease in the number of tourists). Suggested measures to improve factors affecting changes in the income are: addition or creation of new activities; regulation of operations of the stalls and parking area; and generation of greater publicity through the social network.

Keywords: cost, revenue, tourist, walking street

Procedia PDF Downloads 362
3210 Adult Child Labour Migration and Elderly Parent Health: Recent Evidence from Indonesian Panel Data

Authors: Alfiah Hasanah, Silvia Mendolia, Oleg Yerokhin

Abstract:

This paper explores the impacts of adult child migration on the health of elderly parents left behind. The maternal and children health are a priority of health-related policy in most low and middle-income country, and so there is lack of evidence on the health of older population particularly in Indonesia. With increasing life expectancy and limited access to social security and social services for the elderly in this country, the consequences of increasing number of out-migration of adult children to parent health are important to investigate. This study use Indonesia Family Life Survey (IFLS), the only large-scale continuing longitudinal socioeconomic and health survey that based on a sample of households representing about 83 percent of the Indonesian population in its first wave. Using four waves of IFLS including the recent wave of 2014, several indicators of the self-rated health status, interviewer-rated health status and days of illness are used to estimate the impact of labour out-migration of adult children on parent health status. Incorporate both individual fixed effects to control for unobservable factors in migrant and non-migrant households and the ordered response of self-rated health, this study apply the ordered logit of “Blow-up and Cluster” (BUC ) estimator. The result shows that labour out-migration of adult children significantly improves the self-rated health status of the elderly parent left behind. Findings of this study are consistent with the view that migration increases family resources and contribute to better health care and nutrition of the family left behind.

Keywords: aging, migration, panel data, self-rated health

Procedia PDF Downloads 350
3209 The Analysis of the Influence of Islamic Religiosity on Tax Morale among Self-Employed Taxpayers in Indonesia

Authors: Nurul Hidayat

Abstract:

Based on the data from the Indonesian Tax Authority, the contribution of self-employed taxpayers in Indonesia is just approximately 1-2 percent of total tax revenues during 2013 - 2015. This phenomenon requires greater attention to understand what factors that may affect it. The fact that Indonesia has the most prominent Muslim population in the world makes it important to analyze whether there potentially exists a correlation between Islamic religiosity and low tax contribution. The low level of tax contribution may provide an initial indication of low tax morale and tax compliance. This study will extend the existing literature by investigating the influence of Islamic religiosity as a moderating effect on the relationship between the perceptions of government legitimacy and tax morale among self-employed taxpayers. There are some factors to consider when taking into account the issue of Islamic religiosity and its relationship with tax morale in this study. Firstly, in Islam, there is a debate surrounding the lawfulness of tax. Some argue that Muslims should not have to pay tax; while others argue that the imposition of the tax is legitimate in circumstances. These views may have an impact on government legitimacy and tax morale. Secondly, according to Islamic sharia, Islam recognizes another compulsory payment, i.e. zakat, which to some extent has similar characteristics to tax. According to Indonesian Income Tax Law, zakat payment has just been accommodated as a deduction from taxable income. As a comparison, Malaysia treats zakat as a tax rebate. The treatment of zakat only as a taxable income deduction may also lead to a conflicting issue regarding the perception of tax fairness that possibly erode the perception of government legitimacy and tax morale. Based on the considerations above, perceptions of government legitimacy become important to influence the willingness of people to pay tax while the level of Islamic religiosity has a potential moderator effect on that correlation. In terms of measuring the relationship among the variables, this study utilizes mixed-quantitative and qualitative methods. The quantitative methods use surveys to approximately 400 targeted taxpayers while the qualitative methods employ in-depth interviews with 12 people, consist of experts, Islamic leaders and selected taxpayers. In particular, the research is being conducted in Indonesia, the country with the largest Muslim population in the world which has not fully implemented Islamic law as state law. The result indicates that Islamic religiosity becomes a moderating effect on the way taxpayers perceived government legitimacy that finally influences on tax morale. The findings of this study are supportive for the improvement of tax regulations by specifically considering tax deductions for zakat.

Keywords: Islamic religiosity, tax morale, government legitimacy, zakat

Procedia PDF Downloads 240
3208 The “Ecological Approach” to GIS Implementation in Low Income Countries’ and the Role of Universities: Union of Municipalities of Joumeh Case Study

Authors: A. Iaaly, O. Jadayel, R. Jadayel

Abstract:

This paper explores the effectiveness of approaches used for the implementation of technology within central governments specifically Geographic Information Systems (GIS). It examines the extent to which various strategies to GIS implementation and its roll out to users within an organization is crucial for its long term assimilation. Depending on the contextual requirements, various implementation strategies exist spanning from the most revolutionary to the most evolutionary, which have an influence on the success of GIS projects and the realization of resulting business benefits within the central governments. This research compares between two strategies of GIS implementation within the Lebanese Municipalities. The first strategy is the “Technological Approach” which is focused on technology acquisition, overlaid on existing governmental frameworks. This approach gives minimal attention to capability building and the long term sustainability of the implemented program. The second strategy, referred to as the “Ecological Approach”, is naturally oriented to the function of the organization. This approach stresses on fostering the evolution of the program and on building the human capabilities. The Union of the Joumeh Municipalities will be presented as a case study under the “Ecological Approach” and the role of the GIS Center at the University of Balamand will be highlighted. Thus, this research contributes to the development of knowledge on technology implementation and the vital role of academia in the specific context of the Lebanese public sector so that this experience may pave the way for further applications.

Keywords: ecological approach GIS, low income countries, technological approach

Procedia PDF Downloads 305
3207 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 145
3206 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 146
3205 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 259
3204 Establishing a Change Management Model for Precision Machinery Industry in Taiwan

Authors: Feng-Tsung Cheng, Shu-Li Wang, Mei-Fang Wu, , Hui-Yu Chuang

Abstract:

Due to the rapid development of modern technology, the widespread usage of the Internet makes business environment changing quickly. In order to be a leader in the global competitive market and to pursuit survive, “changing” becomes an unspoken rules need to follow for the company survival. The purpose of this paper is to build change model by using SWOT, strategy map, and balance scorecard, KPI and change management theory. The research findings indicate that organizational change plan formulated by the case company should require the employee to resist change factors and performance management system issues into consideration and must be set organizational change related programs, such as performance appraisal reward system, consulting and counseling mechanisms programs to improve motivation and reduce staff negative emotions. Then according to the model revised strategy maps and performance indicators proposed in this paper, such as strategy maps add and modify corporate culture, improve internal processes management, increase the growth rate of net income and other strategies. The performance indicators are based on strategy maps new and modified by adding net income growth rate, to achieve target production rate, manpower training achievement rates and other indicators, through amendments to achieve the company’s goal, be a leading brand of precision machinery industry.

Keywords: organizational change, SWOT analysis, strategy maps, performance indicators

Procedia PDF Downloads 284
3203 The Balancing Act: India and Maldives in the Quest for Regional Prosperity

Authors: Arya S. S.

Abstract:

India is one of the powerful country in the world .India and Maldives having common interests in regional security and economic growth, this relationship has seen substantial change in recent years. This paper examines the complex dynamics of this bilateral relationship, emphasizing the careful balancing act that both countries perform in order to advance regional prosperity. It looks at historical connections, geopolitical factors, and current issues like economic cooperation, climate change, and marine security. The study highlights how India's involvement in the Maldives contributes to both bilateral ties and regional stability by examining important initiatives including trade agreements and infrastructure projects. It also discusses the effects of outside factors and the necessity for both nations to strategically manage their interests. In order to contribute to a more affluent and stable Indian Ocean area, this study ultimately seeks to shed light on how India and the Maldives may cooperate to promote sustainable development while tackling security issues. The India Maldives relation is very crucial in the regional stability of Indian ocean region. The initiatives like building infrastructure, giving financial support, and establishing the India-Maldives Friendship Bridge demonstrate India's dedication to Maldivian prosperity. In addition to boosting the Maldives' economy, these investments strengthen India's clout in the area, which is essential for preserving its maritime security interests in the face of growing Chinese dominance. Both India and China involved in a strategic tug of war in order to enhance their dominance in Maldives. There are difficulties with this collaboration including, political unrest in the Maldives has occasionally resulted in changes to foreign policy, particularly under regimes that support stronger ties with China. India has expressed concern about losing strategic footholds in the Indian Ocean as a result of China's extension of influence through debt diplomacy and infrastructure projects. India must therefore strike a balance between advancing its objectives and upholding Maldivian sovereignty as well as the goals of its people and government. In summary, the partnership between India and the Maldives is a complex balancing act that is marked by cultural links, security cooperation, and economic dependency. Both countries must negotiate the complexity of international relations as they work for regional prosperity, especially in light of both internal and external factors. India and the Maldives can strengthen their positions as key actors in the changing dynamics of the Indian Ocean by promoting cooperation and communication. This would not only protect their particular interests but also help create a stable and prosperous South Asian region.

Keywords: regional security, balancing act, debt trap diplomacy, strategic tug of war

Procedia PDF Downloads 16
3202 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 298
3201 Climate Change Adaptation in Agriculture: A General Equilibrium Analysis of Land Re-Allocation in Nepal

Authors: Sudarshan Chalise, Athula Naranpanawa

Abstract:

This paper attempts to investigate the viability of cropland re-allocation as an adaptation strategy to minimise the economy-wide costs of climate change on agriculture. Nepal makes an interesting case study as it is one of the most vulnerable agricultural economies within South Asia. This paper develops a comparative static multi-household Computable General Equilibrium (CGE) model for Nepal with a nested set of Constant Elasticity of Transformation (CET) functional forms to model the allocation of land within different agricultural sectors. Land transformation elasticities in these CET functions are allowed to reflect the ease of switching from one crop to another based on their agronomic characteristics. The results suggest that, in the long run, farmers in Nepal tend to allocate land to crops that are comparatively less impacted by climate change, such as paddy, thereby minimizing the economy-wide impacts of climate change. Furthermore, the results reveal that land re-allocation tends to reduce the income disparity among different household groups by significantly moderating the income losses of rural marginal farmers. Therefore, it is suggested that policy makers in Nepal should prioritise schemes such as providing climate-smart paddy varieties (i.e., those that are resistant to heat, drought and floods) to farmers, subsidising fertilizers, improving agronomic practices, and educating farmers to switch from crops that are highly impacted by climate change to those that are not, such as paddy.

Keywords: climate change, general equilibrium, land re-allocation, nepalese agriculture

Procedia PDF Downloads 331
3200 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 432
3199 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia

Authors: Rachel Thomas Tharmabalan

Abstract:

The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.

Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems

Procedia PDF Downloads 155
3198 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 126
3197 Pros and Cons of Different Types of Irrigation Systems for Date Palm Production in Sebha, Libya

Authors: Ahmad Aridah, Maria Fay Rola-Rubzen, Zora Singh

Abstract:

This study investigated the effectiveness of various types of irrigation systems in regards to the impact that these have on the productivity of date palms in the semi-arid and arid region of Sebha, Southwest Libya. The date palm is an economically important crop in Libya and contributes to the agriculture industry, foreign exchange earnings, farmers’ income, and employment in the country. The date palm industry relies on large amounts of water for growing the crop. Farmers in Southwest Libya use a variety of irrigation systems, but the quality and quantity of water varies between systems and this affects the productivity and income of farmers. Using survey data from 210 farmers, this study estimated and assessed the pros and cons of different types of irrigation systems for date palm production under various irrigation systems currently used in Sebha, Libya. The number of years farmers have used irrigation, the area, irrigation water consumption, time of irrigation, number of farm workers (including family labour) and inputs used were measured for surface, sprinkler and drip irrigation methods. Findings from this research provide new insights into the advantages and disadvantages of the various irrigation systems, problems encountered by farmers and the factors that affect the quality and quantity of the irrigation system. The paper discussed proposed solutions to deal with the problems including timing of irrigation, canal maintenance, repair of wells and water control.

Keywords: Libya, factors, irrigation method, date palm

Procedia PDF Downloads 351
3196 Biodiversity of the National Production through Companion Plants Analysis

Authors: Astrid Rivera, Diego Villatoro

Abstract:

The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.

Keywords: biodiversity, food security, companion plats, nutrition

Procedia PDF Downloads 198
3195 A Sociological Study of the Potential Role of Retired Soldiers in the Post War Development and Reconstruction in Sri Lanka

Authors: Amunupura Kiriwandeiye Gedara, Asintha Saminda Gnanaratne

Abstract:

The security forces can be described as a workforce that goes beyond the role of ensuring the national security and contributes to the development process of the country. Soldiers are following combatant training courses during their tenure, they are equipped with a variety of vocational training courses to satisfy the needs of the army, to equip them with vocational training capabilities to achieve the development and reconstruction goals of the country as well as for the betterment of society in the event of emergencies. But with retirement, their relationship with the military is severed, and they are responsible for the future of their lives. The main purpose of this study was to examine how such professional capabilities can contribute to the development of the country, the current socio-economic status of the retired soldiers, and the current application of the vocational training skills they have mastered in the army to develop and rebuild the country in an effective manner. After analyzing the available research literature related to this field, a conceptual framework was developed and according to qualitative research methodology, and data obtained from Case studies and interviews are analyzed by using thematic analysis. Factors influencing early retirement include a lack of understanding of benefits, delays in promotions, not being properly evaluated for work, getting married on hasty decisions, and not having enough time to spend on family and household chores. Most of the soldiers are not aware about various programs and benefits available to retirees. They do not have a satisfactory attitude towards the retirement guidance they receive from the army at the time of retirement. Also, due to the lack of understanding about how to use their vocational capabilities successfully pursue their retirement life, the majority of people are employed in temporary jobs, and some are successful in post-retirement life due to their successful use of training received. Some live on pensions without engaging in any income-generating activities, and those who retire after 12 years of service are facing severe economic hardships as they do not get pensions. Although they have received training in various fields, they do not use them for their benefit due to lack of proper guidance. Although the government implements programs, they are not clearly aware of them. Barriers to utilization of training include an absence of a system to identify the professional skills of retired soldiers, interest in civil society affairs, exploration of opportunities in the civil and private sectors, and politicization of services. If they are given the opportunity, they will be able to contribute to the development and reconstruction process. The findings of the study further show that it has many social, economic, political, and psychological benefits not only for individuals but also for a country. Entrepreneurship training for all retired soldiers, improving officers' understanding, streamlining existing mechanisms, creating new mechanisms, setting up a separate unit for retirees, and adapting them to civil society, private and non-governmental contributions, and training courses can be identified as potential means to improve the current situation.

Keywords: development, reconstruction, retired soldiers, vocational capabilities

Procedia PDF Downloads 133
3194 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035

Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo

Abstract:

This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.

Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases

Procedia PDF Downloads 94
3193 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 272
3192 Finding the Theory of Riba Avoidance: A Scoping Review to Set the Research Agenda

Authors: Randa Ismail Sharafeddine

Abstract:

The Islamic economic system is distinctive in that it implicitly recognizes money as a separate, independent component of production capable of assuming risk and so entitled to the same reward as other Entrepreneurial Factors of Production (EFP). Conventional theory does not identify money capital explicitly as a component of production; rather, interest is recognized as a reward for capital, the interest rate is the cost of money capital, and it is also seen as a cost of physical capital. The conventional theory of production examines how diverse non-entrepreneurial resources (Land, Labor, and Capital) are selected; however, the economic theory community is largely unaware of the reasons why these resources choose to remain as non-entrepreneurial resources as opposed to becoming entrepreneurial resources. Should land, labor, and financial asset owners choose to work for others in return for rent, income, or interest, or should they engage in entrepreneurial risk-taking in order to profit. This is a decision made often in the actual world, but it has never been effectively treated in economic theory. This article will conduct a critical analysis of the conventional classification of factors of production and propose a classification for resource allocation and income distribution (Rent, Wages, Interest, and Profits) that is more rational, even within the conventional theoretical framework for evaluating and developing production and distribution theories. Money is an essential component of production in an Islamic economy, and it must be used to sustain economic activity.

Keywords: financial capital, production theory, distribution theory, economic activity, riba avoidance, institution of participation

Procedia PDF Downloads 91
3191 Symptoms Experiences among Thai Adults with Chronic Illnesses: A Study in an Urban Community Area of Bangkok

Authors: Orapan Thosingha, Tassana Boontong, Prapa Yuttatri, Vilaivan Thongcharoen, Soparn Potaya, Mattika Chaichan, Chanin Chakkrapopyodhin, Khwanthida Phimphakarn, Taddao Nabnean

Abstract:

This research aimed to explore symptom experiences among Thai adults with chronic illnesses living in an urban community area of Bangkok. The sample was 670 adults with ages ranging from 20-59 years. The majority of them (65.2%) had more than one disease. Hypertension, dyslipidemia, and diabetes were the first three diseases among them. About 58% were female, and 51.1 % stayed with their couples. The studied sample had relatively low socioeconomic status; 33.7% were wage workers, 15.2% were street vendors, and 10.4% were unemployed. About 54 % had family incomes less than 10,000 baht (300 US Dollars) per month, and 41.6% addressed that their incomes were not adequate for daily living. Although the majority of them (63.7%) did not have to pay for hospital visits, they still had to pay for public transportation and could not earn a wage or any income on the hospital visit day. The first three physical symptoms they experienced were knee pain (60.5%) due to being overweight, headache (47.0%), and insomnia (44.6%). About 45% stated that their incomes decreased after having chronic illnesses and 37.2% expressed that having lower incomes affected their living, 34.5% perceived being a burden, and 34.3% regret about depending on others. It can be concluded that adults with low socioeconomic status who experienced chronic illnesses and resided in an urban community area had complex needs. While caring for them, nurses should pay attention not only to a disease-related domain but also to a social-related domain. Reached-out clinics led by professional nurses who are well-prepared for primary medical care and home visit are strongly recommended. National Health Security Office should adopt this policy and develop an action plan to serve the needs of chronically ill adults with low socioeconomic status.

Keywords: chronic illnesses, urban community, socioeconomic status, symptom experiences, low incomes

Procedia PDF Downloads 113
3190 Towards A New Maturity Model for Information System

Authors: Ossama Matrane

Abstract:

Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.

Keywords: information system, maturity models, information security management, OPM3, IT governance

Procedia PDF Downloads 447
3189 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 121
3188 Climate Change Adaptation Success in a Low Income Country Setting, Bangladesh

Authors: Tanveer Ahmed Choudhury

Abstract:

Background: Bangladesh is one of the largest deltas in the world, with high population density and high rates of poverty and illiteracy. 80% of the country is on low-lying floodplains, leaving the country one of the most vulnerable to the adverse effects of climate change: sea level rise, cyclones and storms, salinity intrusion, rising temperatures and heavy monsoon downpours. Such climatic events already limit Economic Development in the country. Although Bangladesh has had little responsibility in contributing to global climatic change, it is vulnerable to both its direct and indirect impacts. Real threats include reduced agricultural production, worsening food security, increased incidence of flooding and drought, spreading disease and an increased risk of conflict over scarce land and water resources. Currently, 8.3 million Bangladeshis live in cyclone high risk areas. However, by 2050 this is expected to grow to 20.3 million people, if proper adaptive actions are not taken. Under a high emissions scenario, an additional 7.6 million people will be exposed to very high salinity by 2050 compared to current levels. It is also projected that, an average of 7.2 million people will be affected by flooding due to sea level rise every year between 2070-2100 and If global emissions decrease rapidly and adaptation interventions are taken, the population affected by flooding could be limited to only about 14,000 people. To combat the climate change adverse effects, Bangladesh government has initiated many adaptive measures specially in infrastructure and renewable energy sector. Government is investing huge money and initiated many projects which have been proved very success full. Objectives: The objective of this paper is to describe some successful measures initiated by Bangladesh government in its effort to make the country a Climate Resilient. Methodology: Review of operation plan and activities of different relevant Ministries of Bangladesh government. Result: The following initiative projects, programs and activities are considered as best practices for Climate Change adaptation successes for Bangladesh: 1. The Infrastructure Development Company Limited (IDCOL); 2. Climate Change and Health Promotion Unit (CCHPU); 3. The Climate Change Trust Fund (CCTF); 4. Community Climate Change Project (CCCP); 5. Health, Population, Nutrition Sector Development Program (HPNSDP, 2011-2016)- "Climate Change and Environmental Issues"; 6. Ministry of Health and Family Welfare, Bangladesh and WHO Collaboration; - National Adaptation Plan. -"Building adaptation to climate change in health in least developed countries through resilient WASH". 7. COP-21 “Climate and health country profile -2015 Bangladesh. Conclusion: Due to a vast coastline, low-lying land and abundance of rivers, Bangladesh is highly vulnerable to climate change. Having extensive experience with facing natural disasters, Bangladesh has developed a successful adaptation program, which led to a significant reduction in casualties from extreme weather events. In a low income country setting, Bangladesh had successfully adapted various projects and initiatives to combat future Climate Change challenges.

Keywords: climate, change, success, Bangladesh

Procedia PDF Downloads 249
3187 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 384
3186 Integrated Farming Barns as a Strategy for National Food Security

Authors: Ilma Ulfatul Janah, Ibnu Rizky Briwantara, Muhammad Afif

Abstract:

The agricultural sector is one of the sectors that contribute to national development. The benefit of the agricultural sector can be felt directly by the majority of Indonesian people. Indonesia is one of the agricultural countries and most of the people working in the agricultural sector. Hence, the agricultural sector’s become the second sector which has contributed greatly to the growth of Gross Domestic Product (GDP) after the manufacture sector. Based on the National Medium Term Development Plan (RPJMN) from 2015 to 2019, one of the targets to be achieved by the Indonesian government is rice’s self-sufficient. Rice is the main food commodities which as most people in Indonesia, and it is making Indonesian government attempt self-sufficient in rice. Indonesia as an agricultural country becomes one of the countries that have a lower percentage of food security than other ASEAN countries. Rice self-sufficiency can be created through agricultural productivity and the availability of a market for the output. There are some problems still to be faced by the farmers such as farmer exchange rate is low. The low exchange rate of farmers showed that the level of the welfare’s Indonesian farmers is still low. The aims of this paper are to resolve problems related to food security and improve the welfare of the national rice farmers. The method by using materials obtained from the analysis of secondary data with the descriptive approach and conceptual framework. Integrated Farmers barn raising rice production is integrated and managed by the government coupled with the implementation of technology in the form of systems connected and accessible to farmers, namely 'SIBUNGTAN'.

Keywords: agriculture, self-sufficiency, technology, productivity

Procedia PDF Downloads 249