Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7118

Search results for: national security exception

5978 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 139
5977 Statistical Randomness Testing of Some Second Round Candidate Algorithms of CAESAR Competition

Authors: Fatih Sulak, Betül A. Özdemir, Beyza Bozdemir

Abstract:

In order to improve symmetric key research, several competitions had been arranged by organizations like National Institute of Standards and Technology (NIST) and International Association for Cryptologic Research (IACR). In recent years, the importance of authenticated encryption has rapidly increased because of the necessity of simultaneously enabling integrity, confidentiality and authenticity. Therefore, at January 2013, IACR announced the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR Competition) which will select secure and efficient algorithms for authenticated encryption. Cryptographic algorithms are anticipated to behave like random mappings; hence, it is important to apply statistical randomness tests to the outputs of the algorithms. In this work, the statistical randomness tests in the NIST Test Suite and the other recently designed randomness tests are applied to six second round algorithms of the CAESAR Competition. It is observed that AEGIS achieves randomness after 3 rounds, Ascon permutation function achieves randomness after 1 round, Joltik encryption function achieves randomness after 9 rounds, Morus state update function achieves randomness after 3 rounds, Pi-cipher achieves randomness after 1 round, and Tiaoxin achieves randomness after 1 round.

Keywords: authenticated encryption, CAESAR competition, NIST test suite, statistical randomness tests

Procedia PDF Downloads 315
5976 Assessment of the Spatio-Temporal Distribution of Pteridium aquilinum (Bracken Fern) Invasion on the Grassland Plateau in Nyika National Park

Authors: Andrew Kanzunguze, Lusayo Mwabumba, Jason K. Gilbertson, Dominic B. Gondwe, George Z. Nxumayo

Abstract:

Knowledge about the spatio-temporal distribution of invasive plants in protected areas provides a base from which hypotheses explaining proliferation of plant invasions can be made alongside development of relevant invasive plant monitoring programs. The aim of this study was to investigate the spatio-temporal distribution of bracken fern on the grassland plateau of Nyika National Park over the past 30 years (1986-2016) as well as to determine the current extent of the invasion. Remote sensing, machine learning, and statistical modelling techniques (object-based image analysis, image classification and linear regression analysis) in geographical information systems were used to determine both the spatial and temporal distribution of bracken fern in the study area. Results have revealed that bracken fern has been increasing coverage on the Nyika plateau at an estimated annual rate of 87.3 hectares since 1986. This translates to an estimated net increase of 2,573.1 hectares, which was recorded from 1,788.1 hectares (1986) to 4,361.9 hectares (2016). As of 2017 bracken fern covered 20,940.7 hectares, approximately 14.3% of the entire grassland plateau. Additionally, it was observed that the fern was distributed most densely around Chelinda camp (on the central plateau) as well as in forest verges and roadsides across the plateau. Based on these results it is recommended that Ecological Niche Modelling approaches be employed to (i) isolate the most important factors influencing bracken fern proliferation as well as (ii) identify and prioritize areas requiring immediate control interventions so as to minimize bracken fern proliferation in Nyika National Park.

Keywords: bracken fern, image classification, Landsat-8, Nyika National Park, spatio-temporal distribution

Procedia PDF Downloads 179
5975 Constitutional Identity: The Connection between National Constitutions and EU Law

Authors: Norbert Tribl

Abstract:

European contemporary scientific public opinion considers the concept of constitutional identity as a highlighted issue. Some scholars interpret the matter as the manifestation of a conflict of Europe. Nevertheless, constitutional identity is a bridge between the Member States and the EU rather than a river that will wash away the achievements of the integration. In accordance with the opinion of the author, the main problem of constitutional identity in Europe is the undetermined nature: the exact concept of constitutional identity has not been defined until now. However, this should be the first step to understand and use identity as a legal institution. Having regard to this undetermined nature, the legal-theoretical examination of constitutional identity is the main purpose of this study. The concept of constitutional identity appears in the Anglo-Saxon legal systems by a different approach than in the supranational system of European Integration. While the interpretation of legal institutions in conformity with the constitution is understood under it, the European concept is applied when possible conflicts arise between the legal system of the European supranational space and certain provisions of the national constitutions of the member states. The European concept of constitutional identity intends to offer input in determining the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration. In the EU system of multilevel constitutionalism, a long-standing central debate on integration surrounds the conflict between EU legal acts and the constitutional provisions of the member states. In spite of the fact that the Court of Justice of the European Union stated in Costa v. E.N.E.L. that the member states cannot refer to the provisions of their respective national constitutions against the integration. Based on the experience of more than 50 years since the above decision, and also in light of the Treaty of Lisbon, we now can clearly see that EU law has itself identified an obligation for the EU to protect the fundamental constitutional features of the Member States under Article 4 (2) of Treaty on European Union, by respecting the national identities of member states. In other words, the European concept intends to offer input for the determination of the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration.

Keywords: constitutional identity, EU law, European Integration, supranationalism

Procedia PDF Downloads 147
5974 Body Types of Softball Players in the 39th National Games of Thailand

Authors: Nopadol Nimsuwan, Sumet Prom-in

Abstract:

The purpose of this study was to investigate the body types, size, and body compositions of softball players in the 39th National Games of Thailand. The population of this study was 352 softball players who participated in the 39th National Games of Thailand from which a sample size of 291 was determined using the Taro Yamane formula and selection is made with stratified sampling method. The data collected were weight, height, arm length, leg length, chest circumference, mid-upper arm circumference, calf circumference, subcutaneous fat in the upper arm area, the scapula bone area, above the pelvis area, and mid-calf area. Keys and Brozek formula was used to calculate the fat quantity, Kitagawa formula to calculate the muscle quantity, and Heath and Carter method was used to determine the values of body dimensions. The results of the study can be concluded as follows. The average body dimensions of the male softball players were the endo-mesomorph body type while the average body dimensions of female softball players were the meso-endomorph body type. When considered according to the softball positions, it was found that the male softball players in every position had the endo-mesomorph body type while the female softball players in every position had the meso-endomorph body type except for the center fielder that had the endo-ectomorph body type. The endo-mesomorph body type is suitable for male softball players, and the meso-endomorph body type is suitable for female softball players because these body types are suitable for the five basic softball skills which are: gripping, throwing, catching, hitting, and base running. Thus, people related to selecting softball players to play in sports competitions of different levels should consider factors in terms of body type, size, and body components of the players.

Keywords: body types, softball players, national games of Thailand, social sustainability

Procedia PDF Downloads 484
5973 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services

Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt

Abstract:

Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.

Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology

Procedia PDF Downloads 444
5972 The Use of Foreign Law by the Constitutional Court of Taiwan: A Case-By-Case Analysis from 1990 to 2017

Authors: Mingsiang Chen

Abstract:

The increasing transactions among countries worldwide have brought about a trend of comparative law research in the legal community. An important branch of legal research, i.e., constitutional law, is no exception to the trend. The comparative study of constitutional law takes various forms, and one of these is to study the use of foreign law by constitutional courts. There are, in essence, three sources of foreign law usually used by constitutional courts: foreign constitutions, decisions by foreign constitutional courts, and legal theories developed by foreign scholars. There are two types of using foreign law by constitutional courts: citing any of the forenamed sources for reference purpose, ruling based on the contents or logic of any of the forenamed sources. This paper examines all the decisions handed down by the Constitutional Court of Taiwan from 1990 to 2017. Its purpose is to seek out the occasions, the extent, the significance, and the approach of such usage.

Keywords: comparative constitutional law, constitutional court, judicial review, Taiwan judiciary

Procedia PDF Downloads 224
5971 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 221
5970 Anti-Money Laundering and Countering of Terrorist Financing: The Role of Domestic Financial Institutions to Prevent Money Laundering

Authors: Dinesh Sivaguru, Kamal Thilakasiri

Abstract:

Preventing money laundering and terrorist financing is a major national and international problem today. Several attempts have been made to prevent money laundering by national and international dimension. These are often counteracted by the multi dynamic nature of the crimes. However, launders are often to use remittance systems to clean their ill-gotten money. This study presents the role of domestic financial institutions and the effective practices and actions should implement within domestic financial institutions to control and prevent financial crimes. This thesis highlights the progress that is required to prevent money laundering and terrorist financing, further it is an original contribution to the knowledge in an under researched field in Sri Lanka.

Keywords: money laundering, terrorists financing, financial institutions, regulatory bodies

Procedia PDF Downloads 230
5969 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System

Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam

Abstract:

Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.

Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system

Procedia PDF Downloads 36
5968 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 132
5967 Trans-Gendered Female Characters: A Comparative Study of Two Female Characters in English and Persian Literature - Lady Macbeth and Gord Afarid

Authors: Seyedeh Azadeh Johari

Abstract:

For thousand years, the literature of the world has been mostly composed of men, and in all different forms of it, men have tried to propose their masculine desires, ideologies, and beliefs. What has been less written about or studied, however, was the role that female desire plays in the predominantly masculine society, and mostly the role of male desires was the key point in literature. Male writers have mostly shown their female characters either as stereotypes and void of dynamic characters, images of a meek person who bent to the will of her male superiors or as wicked or villains. The only exception was the kind of strong and courageous women who have mostly been masculinized by their authors, mostly male authors, as showing the valuable or important features of men, instead of women’s. These characters are transgendered by the author and have a gender identity or expression that differs from the sex to which they were assigned. This is the issue that is discussed in this project. We will refer to some examples of female characters who show masculine traits and characteristics.

Keywords: comparative literature, female, masculinized, transgendered

Procedia PDF Downloads 152
5966 Role of Numerical Simulation as a Tool to Enhance Climate Change Adaptation and Resilient Societies: A Case Study from the Philippines

Authors: Pankaj Kumar

Abstract:

Rapid global changes resulted in unfavorable hydrological, ecological, and environmental changes and cumulatively affected natural resources. As a result, the local communities become vulnerable to water stress, poor hygiene, the spread of diseases, food security, etc.. However, the central point for this vulnerability revolves around water resources and the way people interrelate with the hydrological system. Also, most of the efforts to minimize the adverse effect of global changes are centered on the mitigation side. Hence, countries with poor adaptive capacities and poor governance suffer most in case of disasters. However, several transdisciplinary numerical tools are well designed and are capable of answering “what-if questions” through scenario analysis using a system approach. This study has predicted the future water environment in Marikina River in the National Capital Region, Metro Manila of Philippines, using Water Evaluation and Planning (WEAP), an integrated water resource management tool. Obtained results can answer possible adaptation measures along with their associated uncertainties. It also highlighted various challenges for the policy planners to design adaptation countermeasures as well as to track the progress of achieving SDG 6.0.

Keywords: water quality, Philippines, climate change adaptation, hydrological simulation, wastewater management, weap

Procedia PDF Downloads 105
5965 Expanding Business Strategy to Native American Communities Using Experiential Learning

Authors: A. J. Otjen

Abstract:

Native American communities are struggling with unemployment and depressed economies. A major cause is a lack of business knowledge, education, and cultural desire. And yet, in the history of the American West, Native Americans were considered the best traders and negotiators for everything from furs to weapons to buffalo. To improve these economies, there has been an effort to reintroduce that heritage to todays and tomorrows generation of tribal members, such Crow, Cheyenne, and Blackfeet. Professors at the College of Business Montana State University-Billings (MSUB) teach tribal students in Montana to create business plans. These plans have won national small business plan competitions. The teaching and advising method used at MSUB is uniquely successful as theses business students are now five time national champions. This article reviews the environment and the method of learning to achieve a winning small business plan with Native American students. It discusses the five plans that became national champions. And it discusses the problems and solutions discovered in the process of achieving results. Students who participated in this endeavor have graduated and become CPAs, MBAs, and gainfully employed in their chosen professions. They have also worked to improve the economies of their native lands and homes. By educating members of these communities with business strategy and plan development, they are better able to impact their own economies.

Keywords: entrepreneurship, native American economies, small businesses, unemployment

Procedia PDF Downloads 476
5964 Patriotic Education through Private/Everyday Narratives: What We Can Learn from Young People

Authors: Yijie Wang, Hanwei Cheng

Abstract:

Under the Chinese educational context, the materials for patriotic education typically take the form of grand narratives. However, in post-modern times the younger members of society tend to welcome elements of more micro and personal nature. It is therefore important to explore how patriotism can be integrated into an ‘everyday’, private narrative that holds more attraction for the young. Based on semi-structured interviews of eight Chinese graduate students, this research examines how Chinese young people draw materials to establish national identity and develop love for the country from everyday-life details, as well as how they perceive, interpret and articulate their patriotism through private narratives. And implications for patriotic education are proposed accordingly. Several conclusions are drawn from the pre-interviews. Firstly, sensory experiences that remind people of their country—such as the taste of Chinese delicacies and the sound of a traditional instrument—are a major source of patriotic feelings. Secondly, the love for the country often stems from and is continued to be mediated by the emotional attachment with other people, typically significant others, and patriotism is articulated (or acknowledged) by the young as a kind of ‘sentiment’ rather than ‘faith’ or ‘belief’. Thirdly, for young people who are currently studying abroad, their birth country represents a kind of familiar, well-accustomed life or lifestyle, and any nostalgic realization of it leads to increased national belonging and sense of identity. Fourthly, the awareness of the country’s transformations—positive ones and neutral ones alike—triggers young people affections towards the country, and even negative transformations may result in promoted sense of self-involvement and therefore consolidate national identity. Implications for patriotic education can be drawn accordingly, and although the research is conducted under the Chinese context, it will hopefully contribute to the understanding of relevant fields.

Keywords: national identity, patriotic education, private narrative, young people

Procedia PDF Downloads 194
5963 Bi-Lateral Comparison between NIS-Egypt and NMISA-South Africa for the Calibration of an Optical Time Domain Reflectometer

Authors: Osama Terra, Mariesa Nel, Hatem Hussein

Abstract:

Calibration of Optical Time Domain Reflectometer (OTDR) has a crucial role for the accurate determination of fault locations and the accurate calculation of loss budget of long-haul optical fibre links during installation and repair. A comparison has been made between the Egyptian National Institute for Standards (NIS-Egypt) and the National Metrology institute of South Africa (NMISA-South Africa) for the calibration of an OTDR. The distance and the attenuation scales of a transfer OTDR have been calibrated by both institutes using their standards according to the standard IEC 61746-1 (2009). The results of this comparison have been compiled in this report.

Keywords: OTDR calibration, recirculating loop, concatenated method, standard fiber

Procedia PDF Downloads 448
5962 Impact of Curriculum Politicization on the Teaching-Learning Process in 'Patriotism-Building', Compulsory History Courses in Bangladesh's Higher Education

Authors: Raiya Kishwar Ashraf

Abstract:

The National University, the largest public educational institution in Bangladesh, recently made it mandatory for all students to study a course in Bangladesh‘s history of the 1971 Liberation War. This introduction was accompanied by massive political, financial and academic movement that allocated resources towards achieving greater awareness of the country‘s spirit, goals of liberation and patriotism among the youth. This study argues that the infrastructure and political economy around the course heavily politicizes the education system and more specifically the teaching and learning the process. By conducting a qualitative study in three affiliated colleges under the National University, this study aimed to explore the extent to which politicization affected higher education curriculum, especially history education in Bangladesh. The findings revealed significant levels of politicization and structural constraints present in the process that restricts the teacher and student engagement with course materials. The results of this study are useful for curriculum designers and higher education teachers and staffs who wish to develop content and deliver education that promotes critical inquiry among students. The findings further shed light on the importance of identifying and addressing political influences in education curriculum and programme development.

Keywords: Bangladesh higher education, critical thinking, curriculum politicization, history curriculum, National University, teaching-learning method

Procedia PDF Downloads 312
5961 A Temporal Analysis on the Legal Status of the Turkish Straits in the Scope of National and International Legislation

Authors: Gizem Kodak, Birsen Koldemir

Abstract:

The Turkish Straits are at the crossroads of Europe and Asia continents and are unique waterways connecting the Black Sea countries to the rest of the world. Because of the geostrategic value of the location, passage of trade and war ships through the Turkish Straits has become a vital attraction and importance for the great powers and the riparian states throughout the history. This study contains a temporal analysis of the legal measures implemented in the Turkish Straits System. In this context, the historical alternation of the Turkish Straits has been examined, taking into account the relevant national and international regulations. In other words, relevant national and international regulations have been examined in this study according to historical time schedules. Parallel to the main concept mentioned above, the first chapter focuses on international regulations. These arrangements are organized according to date order and in three subheadings: Sèvres Treaty (1920), Lausanne Treaty (1923) and Montreux Convention (1936). Another topic, the national regulations, has been examined under five subheadings. These; (1982), Port Regulations of Canakkale (1982), Marine Traffic Regulations of the Turkish Straits and Marmara Region (1994) and Maritime Traffic Regulations for the Turkish Straits (1998). In doing so, the aim was to identify the differences in legal arrangements throughout the time regarding the navigation through the Turkish Straits. The current situation of the Turkish Straits has been presented in detail in the last part of the work, taking Montreux Convention into consideration. In this context, the articles of the Convention which regulate the passage of trade vessels have been examined from two perspectives; Peace time and war time. As for the measures that can be implemented in time of war, three options put forward depending on Turkey's stance: ‘Turkey not being belligerent’, ‘Turkey being belligerent’ and ‘situation in which Turkey considers herself threatened with imminent danger of war’.

Keywords: temporal analysis, maritime law, Turkish straits, maritime accidents

Procedia PDF Downloads 152
5960 The Role of Food System in Promoting Environmental Planning

Authors: Rayeheh Khatami, Toktam Hanaei, Mohammad Reza Mansouri Daneshvar

Abstract:

Today, many local and national governments are developing urban agriculture as an effective tool in responding to challenges such as food security, poverty and environmental problems. In fact, urban agriculture plays an important role in food system, which can provide citizens' income and become one of the components of economic, social and environmental systems. The purpose of this paper is to analyze the urban agriculture and urban food systems in order to understand the impact of urban foods production on environmental planning in non-western city region context. To achieve such objective, we carry out a case study in Mashhad city of Iran by using qualitative approaches. A survey on documentary studies and planning tools integrate with face to face interview with experts which explain the role of food system in environmental planning process. The paper extends the use of food in the environmental planning, specifically to examine this role to create agricultural garden as a mean to improve agricultural system in non-western country. The paper is concluded with a set of recommendations for researchers and policymakers who seek to create spaces in order to implement urban agriculture in cities for food justice.

Keywords: urban agriculture , agricultural park, city region food system, Mashhad

Procedia PDF Downloads 127
5959 Influences of Culture, Multilingualism and Ethnicity on Using English in Pakistani Universities

Authors: Humaira Irfan Khan

Abstract:

The paper discusses that Pakistan is a multilingual, multicultural, and multiethnic society. The findings from quantitative and qualitative data collected in two public universities look at the importance of English language and the role and status of national and regional languages in the country. The evidence implies that postgraduate students having diverse linguistic, cultural, ethnic, socio-economic, and educational backgrounds display negative attitudes towards the use of English language for academic and interactive functions in universities. It is also discovered that language anxiety of postgraduate students is an outcome of their language learning difficulties. It is suggested that considering the academic needs of students, universities should introduce a language proficiency course to enable them to use English with confidence.

Keywords: Multilingualism, Ethnicity, Cultural Diversity, Importance of English, National language, Regional languages, Language Anxiety

Procedia PDF Downloads 593
5958 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 292
5957 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 31
5956 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 349
5955 Examining Terrorism through a Constructivist Framework: Case Study of the Islamic State

Authors: Shivani Yadav

Abstract:

The Study of terrorism lends itself to the constructivist framework as constructivism focuses on the importance of ideas and norms in shaping interests and identities. Constructivism is pertinent to understand the phenomenon of a terrorist organization like the Islamic State (IS), which opportunistically utilizes radical ideas and norms to shape its ‘politics of identity’. This ‘identity’, which is at the helm of preferences and interests of actors, in turn, shapes actions. The paper argues that an effective counter-terrorism policy must recognize the importance of ideas in order to counter the threat arising from acts of radicalism and terrorism. Traditional theories of international relations, with an emphasis on state-centric security problematic, exhibit several limitations and problems in interpreting the phenomena of terrorism. With the changing global order, these theories have failed to adapt to the changing dimensions of terrorism, especially ‘newer’ actors like the Islamic State (IS). The paper observes that IS distinguishes itself from other terrorist organizations in the way that it recruits and spreads its propaganda. Not only are its methods different, but also its tools (like social media) are new. Traditionally, too, force alone has rarely been sufficient to counter terrorism, but it seems especially impossible to completely root out an organization like IS. Time is ripe to change the discourse around terrorism and counter-terrorism strategies. The counter-terrorism measures adopted by states, which primarily focus on mitigating threats to the national security of the state, are preoccupied with statist objectives of the continuance of state institutions and maintenance of order. This limitation prevents these theories from addressing the questions of justice and the ‘human’ aspects of ideas and identity. These counter-terrorism strategies adopt a problem-solving approach that attempts to treat the symptoms without diagnosing the disease. Hence, these restrictive strategies fail to look beyond calculated retaliation against violent actions in order to address the underlying causes of discontent pertaining to ‘why’ actors turn violent in the first place. What traditional theories also overlook is that overt acts of violence may have several causal factors behind them, some of which are rooted in the structural state system. Exploring these root causes through the constructivist framework helps to decipher the process of ‘construction of terror’ and to move beyond the ‘what’ in theorization in order to describe ‘why’, ‘how’ and ‘when’ terrorism occurs. Study of terrorism would much benefit from a constructivist analysis in order to explore non-military options while countering the ideology propagated by the IS.

Keywords: constructivism, counter terrorism, Islamic State, politics of identity

Procedia PDF Downloads 189
5954 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 36
5953 Ideology and the Writer's Commitment to National Development: Profiling the Nigerian Soldier in Isidore Okpewho's ‘The Last Duty and Festus Iyayi's Heroes’

Authors: Edwin Onwuka, Segun Omidiora, Eugenia Abiodun-Eniaiyekan

Abstract:

The Nigerian military is often the subject of active critical inquiries having played significant roles in Nigeria’s national development. However, the soldier is one of the most vilified characters in Nigeria’s imaginative literature, be it in poetry, drama or prose fiction. In the main, the characterization of soldiers is predictable because of their entrenched stereotype as oppressors, tyrants, bullies, rapists, despots, killers or at best law-breakers subject to no authority outside the military institution. In most novels, the soldier’s personality is associated with force and violence; still, few have defied the norm to portray soldiers that go against the grain of notoriety. Such novels have characterized the Nigerian soldier positively as a civil, thinking and human personality in relating to civil society. To a great extent, two major impetuses that influence literary representation of characters and institutions in African literature are ideology and commitment, and one necessarily impacts on the other in shaping the artistic vision of the writer. Using two war novels therefore as templates, this paper argues that the ideology that drives the Nigerian writer’s socio-cultural commitment to national development shapes their portrayal of the Nigerian soldier in imaginative literature. A major objective of this study, therefore, is to show through close textual analysis that the writers’ ideologies influence their perception and characterization of the Nigerian soldier in Isidore Okpewho’s The Last Duty and Festus Iyayi’s Heroes, two representative novels of both persuasions described above. New Historicism is the critical framework applied in this study and its conclusion is that the Nigerian writer’s characterization of the soldier is influenced by his ideological perception of the military in the policy against the backdrop of their past socio-political activities.

Keywords: commitment, ideology, national development, new historicism, Nigerian soldier

Procedia PDF Downloads 254
5952 Sustainable Housing Framework for the Czech Republic: A Comparative Analysis of International and National Strategies

Authors: Jakub Adamec, Svatava Janouskova, Tomas Hak

Abstract:

The necessity of sustainable housing is explicitly embedded in ‘The 2030 agenda for sustainable development’, in particular, goal 11 ‘sustainable cities and communities’. Every UN member state is obligated to implement strategies from the agenda, including a strategy for sustainable housing into the practice in the local context. As shown in many countries, the lack of knowledge represses the adaptation process of sustainable strategies by governments. Hence, this study explores the concept of sustainable housing within the Czech Republic. The research elaborates on this term, and its current definition concerning ‘Geneva UN Charter on Sustainable Housing’. To this day, the charter represents the most comprehensive framework for a sustainable housing concept. Researchers conducted a comparative analysis of 38 international and 195 Czech national strategic documents. As a result, the charter‘s and strategic documents‘ goals were interconnected, identifying the most represented targets (e.g. improved environmental and energy performance of dwellings, resilient urban settlements which use renewable energy, and sustainable and integrated transport systems). The research revealed, even though the concept of sustainable housing is still dominated by environmental aspects, that social aspects significantly increased its importance. Additionally, this theoretical framework will serve as a foundation for the sustainable housing index development for the Czech Republic.

Keywords: comparative analysis, Czech national strategy, Geneva un charter, sustainable housing, urban theory

Procedia PDF Downloads 135
5951 Solar Radiation Studies for Islamabad, Pakistan

Authors: Sidra A. Shaikh, M. A. Ahmed, M. W. Akhtar

Abstract:

Global and diffuse solar radiation studies have been carried out for Islamabad (Lat: 330 43’ N, Long: 370 71’) to access the solar potential of the area using sunshine hour data. A detailed analysis of global solar radiation values measured using several methods is presented. These values are then compared with the NASA SSE model. The variation in direct and diffuse components of solar radiation is observed in summer and winter months for Islamabad along with the clearness index KT. The diffuse solar radiation is found maximum in the month of July. Direct and beam radiation is found to be high in the month of April to June. From the results it appears that with the exception of monsoon months, July and August, solar radiation for electricity generation can be utilized very efficiently throughout the year. Finally, the mean bias error (MBE), root mean square error (RMSE) and mean percent error (MPE) for global solar radiation are also presented.

Keywords: solar potential, global and diffuse solar radiation, Islamabad, errors

Procedia PDF Downloads 438
5950 Innovation Management Strategy towards the Detroit of Asia

Authors: Jarunee Wonglimpiyarat

Abstract:

This paper explores the innovation management strategy of Thailand in moving towards the Detroit of Asia. The study analyses Thailand’s automotive cluster based on Porter’s Diamond Model and national innovation system (NIS) framework. A qualitative methodology was carried out, using semi-structured interviews with the players in the Thai automotive industry. Thailand took a different NIS approach by pursuing an Original Equipment Manufacture (OEM) strategy to attract foreign investments in building its automotive cluster, a different path from other Asian countries that competed with Own Brand Manufacture (OBM) strategies. The findings provide useful lessons for other newly industrialized countries (NICs) in adopting the cluster policies to move up the technological ladders.

Keywords: innovation management strategy, national innovation system (NIS), Detroit of Asia, original equipment manufacturer (OEM)

Procedia PDF Downloads 346
5949 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 145