Search results for: emotive triggers environmental security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9550

Search results for: emotive triggers environmental security

8380 Terrorism and Sustainable Tourism Development

Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu

Abstract:

Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.

Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness

Procedia PDF Downloads 626
8379 Direct and Moderating Effect of Religious Activities, Sustainability and Peer Support on Job Performance

Authors: Fahad Alam

Abstract:

Work stress directly affects job performance, specifically in a worse environment. Consequently, a social provision plays a crucial part for enhancement. Therefore, the current research investigates the direct and moderating effect between religious activities, sustainability and peer support on job performance at hospitals in Khyber PakhtunKhwa (KPK), Pakistan. Both primary and secondary data are collected through 261 questionnaires of medical employees from four district hospitals in Khyber PakhtunKhwa, Pakistan, in 2018. The analysis was carried out by SPSS16 and SMART PLS3, to test the direct effect of religious activities, sustainability and social support on job performance and the effect of moderating variable 'work environment' on job performance. The finding confirmed that direct and moderating variables play a significant positive effect among religious activities, sustainability and peer support on job performance, the variables help to diminish the strain level or the stress level, consequently helps in the job completed. Affirmative social approaches produce desirable effects on job performance. The research revealed that social provisions are significant triggers for superior practices. Moreover, the results are stimulating because some of the past literature revealed an insignificant correlation between social provision and performance. This study found that there is a significant relationship which persuades health care organizations.

Keywords: job performance, peer’s support, religious activities, sustainability, work environment

Procedia PDF Downloads 117
8378 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 189
8377 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System

Authors: Stephen Wheat

Abstract:

Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.

Keywords: mobile app management, governance, distribution, information security

Procedia PDF Downloads 305
8376 A Comparative Study of Environmental, Social and Economic Cross-Border Cooperation in Post-Conflict Environments: The Israel-Jordan Border

Authors: Tamar Arieli

Abstract:

Cross-border cooperation has long been hailed as a means for stabilizing and normalizing relations between former enemies. Cooperation in problem-solving and realizing of local interests in post-conflict environments can indeed serve as a basis for developing dialogue and meaningful relations between neighbors across borders. Hence the potential for formerly sealed borders to serve as a basis for generating local and national perceptions of interdependence and as a buffer against the resume of conflict. Central questions which arise for policy-makers and third parties are how to facilitate cross-border cooperation and which areas of cooperation best serve to normalize post-conflict border regions. The Israel-Jordan border functions as a post-conflict border, in that it is a peaceful border since the 1994 Israel-Jordan peace treaty yet cross-border relations are defined but the highly securitized nature of the border region and the ongoing Arab-Israel regional conflict. This case study is based on long term qualitative research carried out in the border regions of both Israel and Jordan, which mapped and analyzed cross-border in a wide range of activities – social interactions sponsored by peace-facilitating NGOs, government sponsored agricultural cooperation, municipal initiated emergency planning in cross-border continuous urban settings, private cross-border business ventures and various environmental cooperative initiatives. These cooperative initiatives are evaluated through multiple interviews carried out with initiators and partners in cross-border cooperation as well as analysis of documentation, funding and media. These cooperative interactions are compared based on levels of cross-border local and official awareness and involvement as well as sustainability over time. This research identifies environmental cooperation as the most sustainable area of cross- border cooperation and as most conducive to generating perceptions of regional interdependence. This is a variation to the ‘New Middle East’ vision of business-based cooperation leading to conflict amelioration and regional stability. Environmental cooperation serving the public good rather than personal profit enjoys social legitimization even in the face of widespread anti-normalization sentiments common in the post-conflict environment. This insight is examined in light of philosophical and social aspects of the natural environment and its social perceptions. This research has theoretical implications for better understanding dynamics of cooperation and conflict, as well as practical ramifications for practitioners in border region policy and management.

Keywords: borders, cooperation, post-conflict, security

Procedia PDF Downloads 317
8375 Green Supply Chain Management and Corporate Performance: The Mediation Mechanism of Information Sharing among Firms

Authors: Seigo Matsuno, Yasuo Uchida, Shozo Tokinaga

Abstract:

This paper proposes and empirically tests a model of the relationships between green supply chain management (GSCM) activities and corporate performance. From the literature review, we identified five constructs, namely, environmental commitment, supplier collaboration, supplier assessment, information sharing among suppliers, and business process improvement. These explanatory variables are used to form a structural model explaining the environmental and economic performance. The model was analyzed using the data from a survey of a sample of manufacturing firms in Japan. The results suggest that the degree of supplier collaboration has an influence on the environmental performance directly. While, the impact of supplier assessment on the environmental performance is mediated by the information sharing and/or business process improvement. And the environmental performance has a positive relationship on the economic performance. Academic and managerial implications of our findings are discussed.

Keywords: corporate performance, empirical study, green supply chain management, path modeling

Procedia PDF Downloads 399
8374 Optimal Diesel Engine Technology Analysis Matching the Platform of the Helicopter

Authors: M. Wendeker, K. Siadkowska, P. Magryta, Z. Czyz, K. Skiba

Abstract:

In the paper environmental impact analysis the optimal Diesel engine for a light helicopter was performed. The paper consist an answer to the question of what the optimal Diesel engine for a light helicopter is, taking into consideration its expected performance and design capacity. The use of turbocharged engine with self-ignition and an electronic control system can substantially reduce the negative impact on the environment by decreasing toxic substance emission, fuel consumption and therefore carbon dioxide emission. In order to establish the environmental benefits of the diesel engine technologies, mathematical models were created, providing additional insight on the environmental impact and performance of a classic turboshaft and an advanced diesel engine light helicopter, incorporating technology developments.

Keywords: diesel engine, helicopter, simulation, environmental impact

Procedia PDF Downloads 575
8373 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 492
8372 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 152
8371 Making a Resilient Livable City: Explorations of Smart Management Mechanism for Aging Society’s Disaster Prevention

Authors: Wei-Kuang Liu, Ya-Hsu Chiang

Abstract:

In the coming of an aging society, the issues of living quality, health care, and social security for the elderly have been gradually taken seriously. In order to maintain favorable living condition, urban societies are also facing the challenge of disasters caused by extreme climate change. However, in the practice of disaster prevention, elderly people are always weak due to their physiological conditions. That is to say, in the planning of resilient urbanism, the aging society is relatively in need of more care. Thus, this research aims to map areas where have high-density elderly population and fragile environmental condition in Taiwan, and to understand the actual situation of disaster prevention management in these areas, so as to provide suggestions for the development of intellectual resilient urban management. The research takes the cities of Taoyuan and Taichung as examples for explorations. According to GIS mapping of areas with high aging index, high-density population and high flooding potential, the communities of Sihai and Fuyuan in Taoyuan and the communities of Taichang and Nanshih in Taichung are highlighted. In these communities, it can be found that there are more elderly population and less labor population with high-density living condition. In addition, they are located in the areas where they have experienced severe flooding in the recent past. Based on a series of interviews with community organizations, there is only one community out of the four using flood information mobile app and Line messages for the management of disaster prevention, and the others still rely on the traditional approaches that manage the works of disaster prevention by their community security patrol teams and community volunteers. The interview outcome shows that most elderly people are not interested in learning the use of intellectual devices. Therefore, this research suggests to keep doing the GIS mapping of areas with high aging index, high-density population and high flooding potential for grasping the high-risk communities and to help develop smart monitor and forecast systems for disaster prevention practice in these areas. Based on case-study explorations, the research also advises that it is important to develop easy-to-use bottom-up and two-way immediate communication mechanism for the management of aging society’s disaster prevention.

Keywords: aging society, disaster prevention, GIS, resilient, Taiwan

Procedia PDF Downloads 120
8370 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria

Authors: Aishatu Shuaibu

Abstract:

It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.

Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria

Procedia PDF Downloads 29
8369 Nutrition and Food Safety as Strategic Assets

Authors: Daniel C. S. Lim, W. Y. Tan

Abstract:

The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.

Keywords: food crisis, food safety, global trends, nutritional aspects

Procedia PDF Downloads 391
8368 The Relationship between Demographic, Social and Economic Characteristics and the Level of Implementation of Rural Women’s Practices to Preserve the Environment in the Governorates of Sharkia and Beni Suef

Authors: Asmaa Ahmed Nasr El-Din

Abstract:

The Egyptian countryside faces many environmental problems in the field of environmental pollution in a wide range due to the current bad behavior patterns towards the environment, where the rural people continued to follow unconscious environmental practices in addition to the lack of environmental awareness among the rural people in terms of legislation, and the damages resulting from those practices. Rural women play an important and vital role that cannot be neglected in the field of reducing environmental pollution and rationalizing environmental resources, and it is their responsibility to maintain the safety of environmental elements such as water, air, food, and soil from pollution, either through limiting their personal practice that leads to the pollution of these elements or from During the upbringing of her children on the right behaviors towards these elements to protect them from pollution and thus avoid the infection of family members with diseases arising from environmental pollution that may affect their health and production capacity. Therefore, the research aimed to identify the level of rural women’s implementation of environmental practices (land, water, air, public health, and food waste), as well as determining the nature of the relationship between the studied independent variables (demographic, social and economic characteristics) and the level of rural women’s implementation of their role in preserving the environment and identifying some women’s information sources rural environment to preserve the environment. The research was conducted in the villages of Tarout and Qam al-Arous in the governorates of Sharkia and BeniSuef, respectively, and a random sample of 333 rural women was selected using the Yamani equation. Statistical ratio analysis, arithmetic mean, Pearson simple correlation coefficient value, and T-test.

Keywords: environment, rural women, EL-sharkia, banuef

Procedia PDF Downloads 116
8367 Digital Literacy Skills for Geologist in Public Sector

Authors: Angsumalin Puntho

Abstract:

Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.

Keywords: disruptive technology, digital technology, digital literacy, computer skills

Procedia PDF Downloads 121
8366 Environmental Governance and Opportunities for Disaster Risk Reduction in Nigeria

Authors: Willie Eselebor

Abstract:

Environmental governance is not new, but may consist of a series of actions taken to establish sanity and ensure sustainable environment. While there is a growing accord linking disaster risk reduction with the management of environment and natural resources, little is known about failure to act which constitute vulnerability and how improved governance reduces risk globally. The paper reviews emerging trends in the field of application of governance tools and approaches for reducing disaster risk. The Hyogo Framework for Action (HFA) enjoin all stakeholders to stimulate the sustainable use and management of ecosystems, which promote the implementation of integrated environmental and natural resource planning that incorporate disaster risk reduction, including structural and non-structural measures, such as integrated management of fragile ecosystems. The methodology adopted is a case study of disaster-prone sites, prompting guided analysis on which hazards are traceable to environmental degradation, why a degraded environment reduces community resilience; how healthy ecosystems provide natural defense, and which opportunities exist to address gaps in reduction of disasters in Nigeria. The paper further analyses the interaction between disaster risk and environmental change. It is established that environmental governance remains a challenge; which implies that there is the need for a shift in traditional approaches to disaster risk management; exploring new initiatives and allowing environmental managers to be docketed as disaster risk managers in context, potentially opening up a window of dialogue on disaster risk management.

Keywords: disaster, ecosystem, environment, risk

Procedia PDF Downloads 357
8365 The Role of Inflammasomes for aβ Microglia Phagocytosis in Alzheimer Disease

Authors: Francesca La Rosa , Marina Saresella, Mario Clerici, Michael Heneka

Abstract:

Neuroinflammation plays a key role in the modulation of the pathogenesis of neurodegenerative disorder such as Alzheimer's Disease (AD). Microglia, the main immune effector of the brain, are able to migrate to sites of Amyloid-beta (Aβ) deposition to eliminate Aβ phagocytosis upon activation by multiple receptors: Toll like receptors and scavenger receptors. The issue of whether microglia are able to eliminate pathological lesions such as neurofibrillary tangles or senile plaques from AD brain still remains the matter of controversy. Recent data suggest that the Nod Like Receptor 3 (NLRP3), multiprotein inflammasome complexes, plays a role in AD, as its activation in the microglia by Aβ triggers. IL-1β is produced as a biologically inactive pro-form and requires caspase-1 for activation and secretion. Caspase-1 activity is controlled by inflammasomes. We investigate about the importance of inflammasomes complex in the Aβ phagocytosis and its degradation. The preliminary results of phagocytosis assay and immunofluorescent experiment on primary Microglia cells to lipopolysaccharide (LPS) an Aβ exposure show that a previous treatment with LPS reduce Aβ phagocytosis. Different results were obtained in Primary Microglia wild type, NLRP3 and ASC Knockout suggesting a real inflammasomes involvement in Alzheimer's pathology. Inflammasomes inactivation reduces the production of inflammatory cytokines prolonging the protective activity of microglia and Aβ clearance, featuring a typical microglia phenotype of the early stage of AD disease.

Keywords: Alzheimer disease, innate immunity, neuroinflammation, NLRP3

Procedia PDF Downloads 458
8364 Indoor and Outdoor Forest Farming for Year-Round Food and Medicine Production, Carbon Sequestration, Soil-Building, and Climate Change Mitigation

Authors: Jerome Osentowski

Abstract:

The objective at Central Rocky Mountain Permaculture Institute has been to put in practice a sustainable way of life while growing food, medicine, and providing education. This has been done by applying methods of farming such as agroforestry, forest farming, and perennial polycultures. These methods have been found to be regenerative to the environment through carbon sequestration, soil-building, climate change mitigation, and the provision of food security. After 30 years of implementing carbon farming methods, the results are agro-diversity, self-sustaining systems, and a consistent provision of food and medicine. These results are exhibited through polyculture plantings in an outdoor forest garden spanning roughly an acre containing about 200 varieties of fruits, nuts, nitrogen-fixing trees, and medicinal herbs, and two indoor forest garden greenhouses (one Mediterranean and one Tropical) containing about 50 varieties of tropical fruits, beans, herbaceous plants and more. While the climate zone outside the greenhouse is 6, the tropical forest garden greenhouse retains an indoor climate zone of 11 with near-net-zero energy consumption through the use of a climate battery, allowing the greenhouse to serve as a year-round food producer. The effort to source food from the forest gardens is minimal compared to annual crop production. The findings at Central Rocky Mountain Permaculture Institute conclude that agroecological methods are not only beneficial but necessary in order to revive and regenerate the environment and food security.

Keywords: agroecology, agroforestry, carbon farming, carbon sequestration, climate battery, food security, forest farming, forest garden, greenhouse, near-net-zero, perennial polycultures

Procedia PDF Downloads 446
8363 Banking and Accounting Analysis Researches Effect on Environment

Authors: Marina Magdy Naguib Karas

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 55
8362 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 431
8361 A Study on Energy-Saving Modular Housing Units Considering Environmental and Aesthetic Aspects

Authors: Jae Hee Chung, Tae Uk Kang, Byung Seo Kim

Abstract:

This study aims to propose design technologies for the energy-saving modular housing units considering environmental and aesthetic aspects. Modular houses are environmentally friendly based on 3R (Reduce, Reuse, Recycle) because they can dramatically reduce carbon dioxide and construction wastes generated during the construction, use, and disposal process by the pre-fabrication at the factory and the recyclability of the unit, compared to the existing construction methods. The existing modular housing, however, tends to focus on quantitative aspects of energy reduction, such as windows, insulation, and introduction of renewable energy, and there is not much research on energy-saving type units considering the environmental aspects such as daylighting and ventilation, and the design that goes beyond the standardized appearance. Therefore, this study conducts theoretical investigation and analytical case studies on the energy-saving methods through various architectural planning elements as well as materials like insulation considering the environmental and aesthetic aspects in the modular housing. Then, comparative analysis on the energy efficiency through the energy simulation is conducted. As a conclusion, the energy-saving modular housing units considering environmental and aesthetics aspects are proposed. It is expected that this study will contribute to the supply and activation of modular housing through deriving design technologies for the energy-saving modular housing units that consider not only quantitative aspects but also qualitative aspects.

Keywords: aesthetic aspects, energy-saving, environmental, modular housing

Procedia PDF Downloads 363
8360 Using Virtual Reality to Convey the Information of Food Supply Chain

Authors: Xinrong Li, Jiawei Dai

Abstract:

Food production, food safety, and the food supply chain are causing a great challenge to human health and the environment. Different kinds of food have different environmental costs. Therefore, a healthy diet can alleviate this problem to a certain extent. In this project, an online questionnaire was conducted to understand the purchase behaviour of consumers and their attitudes towards basic food information. However, the data shows that the public's current consumption habits and ideology do not meet the long-term development of sustainable social needs. In order to solve the environmental problems caused by the unbalanced diet of the public and the social problems of unequal food distribution, the purpose of this paper is to explore how to use the emerging media of VR to visualize food supply chain information so as to attract users' attention to the environmental cost of food. In this project, the food supply chain of imported and local cheese was compared side-by-side in the virtual reality environment, including the origin, transportation, sales, and other processes, which can effectively help users understand the difference between the two processes and environmental costs. Besides, the experimental data demonstrated that the participant would like to choose low environmental cost food after experiencing the whole process.

Keywords: virtual reality, information design, food supply chain, environmental cost

Procedia PDF Downloads 101
8359 The Role and Function of National Land Authority as Mediator in Land Dispute Settlements in Indonesia

Authors: Nia Kurniati, Efa Laela Fakhriah

Abstract:

The regulation in Indonesia provides space for the land dispute to be settled outside the court by the government through National Land. In this case, the bureaucrat of Badan Pertanahan Nasional (BPN) acts as mediator to reach a fair agreement between the disputing parties. Land dispute is from a party who denies the ownership of the other party of a land and denies legal-technical facts written on land certificate published by BPN. Appointing the bureaucrat of BPN as mediator in dispute settlements may possibly create conflict of interest since the object. It has become a concern since bureaucrat of BPN acts as mediator, he will be bias and partial in assisting the dispute settlement, thus the spirit and purposes of mediation will be hampered. This issue triggers to be thoroughly examined further in a relation with the role and function of BPN as land dispute mediator. The methodology used in this research is a normative-legal one with qualitative-legal analytical method. The object of this research is in the form of random sampling of land dispute cases being occurred in some areas. Several principles in mediation have to be made as the base of the consideration to appoint bureaucrat of BPN as mediator since the mediator is an impartial third party, working with both disputing parties and assisting them to reach a fair resolution written in agreement as a foundation of land dispute settlement. The existence of BPN as mediator in land dispute settlement encounters conflict of interest which uphold legal uncertainty to act objectively.

Keywords: Indonesia, land dispute, mediator, national land authority

Procedia PDF Downloads 311
8358 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan

Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed

Abstract:

This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.

Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis

Procedia PDF Downloads 79
8357 Environmental Variables as Determinants of Students Achievement in Biology Secondary Schools in South West Nigeria

Authors: Ayeni Margaret Foluso, K. A. Omotayo

Abstract:

This study investigated the impact of selected environmental variables as determinants of students’ achievements in biology in secondary schools. The selected environmental variables are class size and laboratory adequacy. The purpose was to find out whether these environmental variables can bring about improvement in the learning of biology by Senior Secondary School Students. The study design used was descriptive research of the survey type. Two instruments were used that is, Biology Achievement Test and School Environment Questionnaire .The population of the study consisted of all Biology students in both public and private Senior Secondary Schools class III (SSIII) in all the three selected states in South West Nigeria. A sample of 900 Biology students and 45 Biology Teachers from both public and private Senior Secondary Schools Class III were used. Two research hypotheses were generated for the study. The data collected were subjected to both descriptive statistics of mean and standard deviation; and the inferential statistics of regression Analyses was employed to test the hypotheses formulated. From the results, it was revealed that the selected environmental variables had influence on the students’ achievement in biology.

Keywords: environmental variables, determinants, students’ achievement, school science

Procedia PDF Downloads 499
8356 Evaluation of the Ardabil City Environmental Potential for Urban Development

Authors: Seiied Taghi Seiied Safavian, Ebrahim Fataei, Taghi Ebadi

Abstract:

Urbanized population increasing has been a major driving force for physical development and expansion. In this regard, selecting optimal management strategies for sustainable development of cities as the most important population centers has gotten more attention by the city managers. One of the most important issues in planning a sustainable development is environmental sustainability. In this research, identifying the optimal physical development strategies of Ardabil city in the future condition have been investigated based on land-use planning principles and regularities. Determination of suitable lands of urban development was conducted through natural variables comprised of slope, topography, geology, distance from fault, underground water's depth, land-use strategies and earth shape using hierarchical process method (AHP) in Geographical information system (GIS). Region's potential capabilities and talents were estimated by environmental elements extraction and its measurement based on environmental criteria. Consequently, specified suitable areas for Ardabil city development were introduced. Results of this research showed that the northern part of the Ardabil city is the most suitable sites for physical development of this city regarding the environmental sustainability criteria.

Keywords: urban development, environmental sustainability, Ardabil city, AHP, GIS

Procedia PDF Downloads 433
8355 Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy

Authors: Nyumbaiza Tambwe

Abstract:

The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice.

Keywords: alternative strategy, food security, household strategy, hybrid urban agriculture

Procedia PDF Downloads 330
8354 Value from Environmental and Cultural Perspectives or Two Sides of the Same Coin

Authors: Vilem Paril, Dominika Tothova

Abstract:

This paper discusses the value theory in cultural heritage and the value theory in environmental economics. Two economic views of the value theory are compared within the field of cultural heritage maintenance and within the field of the environment. The main aims are to find common features in these two differently structured theories under the layer of differently defined terms as well as really differing features of these two approaches, to clear the confusion which stems from different terminology as in fact these terms capture the same aspects of reality and to show possible inspiration these two perspectives can offer one another. Another aim is to present these two value systems in one value framework. First, important moments of the value theory from the economic perspective are presented, leading to the marginal revolution of (not only) the Austrian School. Then the theory of value within cultural heritage and environmental economics are explored. Finally, individual approaches are compared and their potential mutual inspiration searched for.

Keywords: cultural heritage, environmental economics, existence value, value theory

Procedia PDF Downloads 325
8353 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 402
8352 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints

Authors: Zongjie Wang, Zhizhong Guo

Abstract:

While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.

Keywords: optimal power flow, time period, security, economy

Procedia PDF Downloads 455
8351 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 366