Search results for: enhancing security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4790

Search results for: enhancing security

3620 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria

Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi

Abstract:

Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.

Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization

Procedia PDF Downloads 285
3619 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 146
3618 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 262
3617 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook

Authors: Soorya Vennila

Abstract:

The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.

Keywords: health, watersecurity, water quality, climate change

Procedia PDF Downloads 71
3616 Household Earthquake Absorptive Capacity Impact on Food Security: A Case Study in Rural Costa Rica

Authors: Laura Rodríguez Amaya

Abstract:

The impact of natural disasters on food security can be devastating, especially in rural settings where livelihoods are closely tied to their productive assets. In hazards studies, absorptive capacity is seen as a threshold that impacts the degree of people’s recovery after a natural disaster. Increasing our understanding of households’ capacity to absorb natural disaster shocks can provide the international community with viable measurements for assessing at-risk communities’ resilience to food insecurities. The purpose of this study is to identify the most important factors in determining a household’s capacity to absorb the impact of a natural disaster. This is an empirical study conducted in six communities in Costa Rica affected by earthquakes. The Earthquake Impact Index was developed for the selection of the communities in this study. The households coded as total loss in the selected communities constituted the sampling frame from which the sample population was drawn. Because of the study area geographically dispersion over a large surface, the stratified clustered sampling hybrid technique was selected. Of the 302 households identified as total loss in the six communities, a total of 126 households were surveyed, constituting 42 percent of the sampling frame. A list of indicators compiled based on theoretical and exploratory grounds for the absorptive capacity construct served to guide the survey development. These indicators were included in the following variables: (1) use of informal safety nets, (2) Coping Strategy, (3) Physical Connectivity, and (4) Infrastructure Damage. A multivariate data analysis was conducted using Statistical Package for Social Sciences (SPSS). The results show that informal safety nets such as family and friends assistance exerted the greatest influence on the ability of households to absorb the impact of earthquakes. In conclusion, communities that experienced the highest environmental impact and human loss got disconnected from the social networks needed to absorb the shock’s impact. This resulted in higher levels of household food insecurity.

Keywords: absorptive capacity, earthquake, food security, rural

Procedia PDF Downloads 252
3615 Integration of “FAIR” Data Principles in Longitudinal Mental Health Research in Africa: Lessons from a Landscape Analysis

Authors: Bylhah Mugotitsa, Jim Todd, Agnes Kiragga, Jay Greenfield, Evans Omondi, Lukoye Atwoli, Reinpeter Momanyi

Abstract:

The INSPIRE network aims to build an open, ethical, sustainable, and FAIR (Findable, Accessible, Interoperable, Reusable) data science platform, particularly for longitudinal mental health (MH) data. While studies have been done at the clinical and population level, there still exists limitations in data and research in LMICs, which pose a risk of underrepresentation of mental disorders. It is vital to examine the existing longitudinal MH data, focusing on how FAIR datasets are. This landscape analysis aimed to provide both overall level of evidence of availability of longitudinal datasets and degree of consistency in longitudinal studies conducted. Utilizing prompters proved instrumental in streamlining the analysis process, facilitating access, crafting code snippets, categorization, and analysis of extensive data repositories related to depression, anxiety, and psychosis in Africa. While leveraging artificial intelligence (AI), we filtered through over 18,000 scientific papers spanning from 1970 to 2023. This AI-driven approach enabled the identification of 228 longitudinal research papers meeting inclusion criteria. Quality assurance revealed 10% incorrectly identified articles and 2 duplicates, underscoring the prevalence of longitudinal MH research in South Africa, focusing on depression. From the analysis, evaluating data and metadata adherence to FAIR principles remains crucial for enhancing accessibility and quality of MH research in Africa. While AI has the potential to enhance research processes, challenges such as privacy concerns and data security risks must be addressed. Ethical and equity considerations in data sharing and reuse are also vital. There’s need for collaborative efforts across disciplinary and national boundaries to improve the Findability and Accessibility of data. Current efforts should also focus on creating integrated data resources and tools to improve Interoperability and Reusability of MH data. Practical steps for researchers include careful study planning, data preservation, machine-actionable metadata, and promoting data reuse to advance science and improve equity. Metrics and recognition should be established to incentivize adherence to FAIR principles in MH research

Keywords: longitudinal mental health research, data sharing, fair data principles, Africa, landscape analysis

Procedia PDF Downloads 83
3614 Physical Physics: Enhancing the Learning Experience for Undergraduate Game Development Students

Authors: Y. Kavanagh, N. O'Hara, R. Palmer, P. Lowe, D. Rafferty

Abstract:

Physical Physics is a physics education methodology for games programfmes that integrates physical activity with movement tracking and modelling. It significantly enhances the learning experience and it is effective in illustrating how physics is core in games design and programming, while allowing students to be active participants and take ownership of the learning process. It has been successfully piloted with undergraduate students studying Games Development.

Keywords: activity, enhanced learning, game development, physics

Procedia PDF Downloads 285
3613 Computational Analysis of Adaptable Winglets for Improved Morphing Aircraft Performance

Authors: Erdogan Kaygan, Alvin Gatto

Abstract:

An investigation of adaptable winglets for enhancing morphing aircraft performance is described in this paper. The concepts investigated consist of various winglet configurations fundamentally centered on a baseline swept wing. The impetus for the work was to identify and optimize winglets to enhance the aerodynamic efficiency of a morphing aircraft. All computations were performed with Athena Vortex Lattice modelling with varying degrees of twist and cant angle considered. The results from this work indicate that if adaptable winglets were employed on aircraft’s improvements in aircraft performance could be achieved.

Keywords: aircraft, drag, twist, winglet

Procedia PDF Downloads 577
3612 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 400
3611 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 260
3610 Rescaling Global Health and International Relations: Globalization of Health in a Low Security Environment

Authors: F. Argurio, F. G. Vaccaro

Abstract:

In a global environment defined by ever-increasing health issues, in spite of the progress made by modern medicine, this paper seeks to readdress the question of global health in an international relations perspective. The research hypothesis is: the lower the security environment, the higher the spread of communicable diseases. This question will be channeled by re-scaling the connotation of 'global' and 'international' dimension through the theoretical lens of glocalization, a theory by Bauman that starts its analysis from simple systems to get to the most complex ones. Glocalization theory will be operationalized by analyzing health in an armed-conflict context. In this respect, the independent variable 'low security environment' translates into the cases of Syria and Yemen, which provide a clear example of the all-encompassing nature of conflict on national health and the effects on regional development. In fact, Syria and Yemen have been affected by poliomyelitis and cholera outbreaks respectively. The dependent variable will be constructed on said communicable diseases which belong to the families of sanitation-related and vaccine-preventable diseases. The research will be both qualitative and quantitative, based on primary (interviews) and secondary (WHO and other NGO’s reports) sources. The methodology is based on the assessment of the vaccine coverage and case-analysis in time and space using epidemiological data. Moreover, local health facilities’ functioning and efficiency will be studied. The article posits that the intervention and cooperation of international organizations with the local authorities becomes crucial to provide the local populations with their primary health needs. In Yemen, the majority of fatal cholera cases were in the regions controlled by the Houthi rebels, not officially accredited by the International Community. Similarly, the polio outbreak in Syria primarily affected the areas not controlled by the Syrian Arab Republic forces, recognized as the leading interlocutor by the WHO. The jeopardized possibilities to access these countries have been pivotal to the determining the problem in controlling sanitation-related and vaccine preventable diseases. This represents a potential threat to global health.

Keywords: health in conflict-affected areas, cholera, polio, Yemen, Syria, glocalization

Procedia PDF Downloads 131
3609 Study on Impact of Existence of an Open Boundary Foreign Enclave and a 24-Hours Open Corridor for Foreigners inside Indian Territory

Authors: Debarshi Bhattacharya

Abstract:

In 2015, historic Land Boundary Agreement (LBA) executed between India and Bangladesh finally settled almost seven decades long overdue critical enclave problems of the two neighbouring countries. Enclaves within India and Bangladesh were the awful outcome of the partition of India in 1947. As a dire consequence, the populace within these enclaves enormously suffered from getting basic rights and opportunities and governmental support services till long 67 years after India’s independence and partition. As per LBA, 2015, 51 Bangladeshi (BD) enclaves inside Indian territory and 111 Indian enclaves inside Bangladesh territory were actually transferred to each other. But, by virtue of LBA, 1974 executed earlier between the two countries, one BD enclave situated inside India, namely Dohogram-Angarpota (D-A) twin enclave, had not yet been exchanged by means of LBA, 2015 and it still remains as an integral part, may not be contiguous, of Bangladesh completely surrounded by Indian territory. A study was undertaken through an extensive field survey to assess the impact of the existence of D-A BD enclave inside Indian territory from India’s perspective. Field survey was conducted for the purpose in the form of an interview, group discussion, questionnaire survey, personal interaction etc. to gather information from the Indian people residing adjacent to D-A enclave and Tin Bigha Corridor (TBC), people of D-A enclave, officials of Border Security Forces of India and Bangladesh, public representatives, representatives of political organizations etc. The issue of the existence of D-A BD enclave inside Indian territory seriously brought apprehension of future problems to the people of Kuchlibari Region of Mekhligunj Block, India, on its contiguity with Indian mainland due to 24-hour open access for the BD people through TBC. The anxiety of the local Indian people regarding threats to the national security of India as well as to the law and order issues of the locality due to the open border of D-A BD enclave in the region. On the other hand, it was observed that 24 hours opening of TBC brought significant positive changes to the people of D-A BD enclave in terms of their socio-economic condition and security status.

Keywords: enclave, exchange of enclaves, land boundary agreement, Dohogram-Angarpota (D-A) Bangladeshi (BD) enclave, Tin Bigha Corridor

Procedia PDF Downloads 80
3608 Scar Removal Stretegy for Fingerprint Using Diffusion

Authors: Mohammad A. U. Khan, Tariq M. Khan, Yinan Kong

Abstract:

Fingerprint image enhancement is one of the most important step in an automatic fingerprint identification recognition (AFIS) system which directly affects the overall efficiency of AFIS. The conventional fingerprint enhancement like Gabor and Anisotropic filters do fill the gaps in ridge lines but they fail to tackle scar lines. To deal with this problem we are proposing a method for enhancing the ridges and valleys with scar so that true minutia points can be extracted with accuracy. Our results have shown an improved performance in terms of enhancement.

Keywords: fingerprint image enhancement, removing noise, coherence, enhanced diffusion

Procedia PDF Downloads 511
3607 Trend and Cuses of Decline in Trifoliate Yam (Dioscorea dumentorum) Production in Enugu State, Nigeria: Implication for Food Security and Biodiversity Conservation

Authors: J. C. Iwuchukwu, K. C. Okwor

Abstract:

In recent time and in the study area, yam farmers are moving into less laborious and more economical crops and very few yam farmers are growing trifoliate yam. In yam markets, little or no bitter yam is displayed or sold. The work was therefore designed to ascertain trend and causes of decline in trifoliate yam production in Enugu state. Three agricultural zones, six blocks, eighteen circles and one hundred and eight trifoliate yam farmers that were purposively selected constituted sample for the study. An interview schedule was used to collect data while percentage, mean score and standard deviation were used for data analysis. Findings of the study revealed that the respondents had no extension contact, Majority (90.7%) sourced information on trifoliate yam from neighbours/friends/relatives and produced mainly for consumption (67.6%) during rainy season (70.4%). Trifoliate yam was produced manually(71.3%) and organically (58.3%) in a mixture of other crops (87%) using indigenous/local varieties (73.1%). Mean size of land allocated to trifoliate yam production was relatively steady, mean cost of input and income were increasing while output was decreasing within the years under consideration (before 2001 to 2014). Poor/lack of finance(M=1.8) and drudgery associated with trifoliate yam product(M=1.72) were some of the causes of decline in trifoliate yam production in the area. The study recommended that more research and public enlightenment campaigns on the importance of trifoliate yam should be carried out to encourage and consolidate farmers and the masses effort in production and consumption of the crop so that it will not go extinct and then contribute to food security.

Keywords: causes, decline, trend, trifoliate yam

Procedia PDF Downloads 396
3606 Estimation of Carbon Losses in Rice: Wheat Cropping System of Punjab, Pakistan

Authors: Saeed Qaisrani

Abstract:

The study was conducted to observe carbon and nutrient loss by burning of rice residues on rice-wheat cropping system The rice crop was harvested to conduct the experiment in a randomized complete block design (RCBD) with factors and 4 replications with a net plot size of 10 m x 20 m. Rice stubbles were managed by two methods i.e. Incorporation & burning of rice residues. Soil samples were taken to a depth of 30 cm before sowing & after harvesting of wheat. Wheat was sown after harvesting of rice by three practices i.e. Conventional tillage, Minimum tillage and Zero tillage to observe best tillage practices. Laboratory and field experiments were conducted on wheat to assess best tillage practice and residues management method with estimation of carbon losses. Data on the following parameters; establishment count, plant height, spike length, number of grains per spike, biological yield, fat content, carbohydrate content, protein content, and harvest index were recorded to check wheat quality & ensuring food security in the region. Soil physico-chemical analysis i.e. pH, electrical conductivity, organic matter, nitrogen, phosphorus, potassium, and carbon were done in soil fertility laboratory. Substantial results were found on growth, yield and related parameters of wheat crop. The collected data were examined statistically with economic analysis to estimate the cost-benefit ratio of using different tillage techniques and residue management practices. Obtained results depicted that Zero tillage method have positive impacts on growth, yield and quality of wheat, Moreover, it is cost effective methodology. Similarly, Incorporation is suitable and beneficial method for soil due to more nutrients provision and reduce the need of fertilizers. Burning of rice stubbles has negative impact including air pollution, nutrient loss, microbes died and carbon loss. Recommended the zero tillage technology to reduce carbon losses along with food security in Pakistan.

Keywords: agricultural agronomy, food security, carbon sequestration, rice-wheat cropping system

Procedia PDF Downloads 275
3605 Foresight in Food Supply System in Bogota

Authors: Suarez-Puello Alejandro, Baquero-Ruiz Andrés F, Suarez-Puello Rodrigo

Abstract:

This paper discusses the results of a foresight exercise which analyzes Bogota’s fruit, vegetable and tuber supply chain strategy- described at the Food Supply and Security Master Plan (FSSMP)-to provide the inhabitants of Bogotá, Colombia, with basic food products at a fair price. The methodology consisted of using quantitative and qualitative foresight tools such as system dynamics and variable selection methods to better represent interactions among stakeholders and obtain more integral results that could shed light on this complex situation. At first, the Master Plan is an input to establish the objectives and scope of the exercise. Then, stakeholders and their relationships are identified. Later, system dynamics is used to model product, information and money flow along the fruit, vegetable and tuber supply chain. Two scenarios are presented, discussing actions by the public sector and the reactions that could be expected from the whole food supply system. Finally, these impacts are compared to the Food Supply and Security Master Plan’s objectives suggesting recommendations that could improve its execution. This foresight exercise performed at a governmental level is intended to promote the widen the use of foresight as an anticipatory, decision-making tool that offers solutions to complex problems.

Keywords: decision making, foresight, public policies, supply chain, system dynamics

Procedia PDF Downloads 436
3604 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction

Authors: Didem Aslantaş

Abstract:

In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.

Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria

Procedia PDF Downloads 77
3603 Federal Bureau of Investigation Opposition to German Nationalist Organizations in the United States (1941-45)

Authors: Yaroslav Alexandrovich Levin

Abstract:

In modern research on the history of the United States in World War II, it is quite popular to study the opposition of the American special services and, in particular, the Federal Bureau of Investigation (FBI) to various organizations of the German diasporas in new historical conditions. The appeal to traditional methods of historical research, comparative studies, and the principles of historicism will make it possible to more accurately trace the process of tightening the counterintelligence work of the Bureau and the close connection of concerns about the involvement of public organizations in the intelligence activities of the enemy. The broadcast of nationalist ideas by various communities of Germans under the auspices of their governments quickly attracted the attention of the FBI, which is in the process of consolidating its powers as the main US counterintelligence service. At the same time, the investigations and trials conducted by the John Edgar Hoover Department following these investigations often had an openly political color and increasingly consolidated the beginning of a political investigation in this service. This practice and its implementation ran into a tough contradiction between the legal norms of America, which proclaimed "democratic values," the right to freedom of speech, and the need to strengthen the internal security of the state and society in wartime. All these processes and the associated nuances and complexities are considered in specific examples of the work of federal agents against various pro-German organizations in the period 1941-45.

Keywords: World War II, internal security, countering extremism, counterintelligence, political investigation, FBI

Procedia PDF Downloads 81
3602 Performance Effects of Demergers in India

Authors: Pavak Vyas, Hiral Vyas

Abstract:

Spin-offs commonly known as demergers in India, represents dismantling of conglomerates which is a common phenomenon in financial markets across the world. Demergers are carried out with different motives. A demerger generally refers to a corporate restructuring where, a large company divests its stake in in its subsidiary and distributes the shares of the subsidiary - demerged entity to the existing shareholders without any consideration. Demergers in Indian companies are over a decade old phenomena, with many companies opting for the same. This study examines the demerger regulations in Indian capital markets and the announcement period price reaction of demergers during year 2010-2015. We study total 97 demerger announcements by companies listed in India and try to establish that demergers results into abnormal returns for the shareholders of the parent company. Using event study methodology we have analyzed the security price performance of the announcement day effect 10 days prior to announcement to 10 days post demerger announcement. We find significant out-performance of the security over the benchmark index post demerger announcements. The cumulative average abnormal returns range from 3.71% on the day of announcement of a private demerger to 2.08% following 10 days surrounding the announcement, and cumulative average abnormal returns range from 5.67% on the day of announcement of a public demerger to 4.15% following10 days surrounding the announcement.

Keywords: demergers, event study, spin offs, stock returns

Procedia PDF Downloads 297
3601 Assessment of the Economic Factors and Motivations towards De-Dollarization since the Early 2000s and Their Implications

Authors: Laila Algalal, Chen Xi

Abstract:

The US dollar has long served as the world's primary reserve currency. However, this dominance faces growing challenges from internal US economic pressures and the rise of alternative currencies. Internally, issues like high debt, inflation, reduced competitiveness, and economic instability due to inequality in economic policies threaten the dollar's position. Externally, more countries are establishing alternative currencies, payment systems, and regional financial institutions to reduce dollar dependence. These drivers have contributed to a decline in the dollar's share of global foreign exchange reserves from 71% in 2001 to an estimated 58% in 2022. While this 13-percentage point drop took two decades, recent initiatives suggest de-dollarization could accelerate in the coming few decades. Efforts to establish non-dollar trade deals and alternative financial systems show more substantial progress compared to initiatives in the early 2000s. As the nature of the world system is anarchic, states make either individual or group efforts to guarantee their economic security and achieve their interests. Based on neoclassical realism, this paper analyzes both internal and external US economic factors driving current and future de-dollarization and the implications on the international monetary system, in addition to examining the motivation for such moves.

Keywords: de-dollarization, US dollar, monetary system, economic security, economic policies.

Procedia PDF Downloads 88
3600 Pervious Concrete for Road Intersection Drainage

Authors: Ivana Barišić, Ivanka Netinger Grubeša, Ines Barjaktarić

Abstract:

Road performance and traffic safety are highly influenced by improper water drainage system performance, particularly within intersection areas. So, the aim of the presented paper is the evaluation of pervious concrete made with two types and two aggregate fractions for potential utilization in intersection drainage areas. Although the studied pervious concrete mixtures achieved proper drainage but lower strength characteristics, this pervious concrete has a good potential for enhancing pavement drainage systems if it is embedded on limited intersection areas.

Keywords: drainage, intersection, pervious concrete, road

Procedia PDF Downloads 387
3599 Enhancing Seismic Resilience in Colombia's Informal Housing: A Low-cost Retrofit Strategy with Buckling-restrained Braces to Protect Vulnerable Communities in Earthquake-prone Regions

Authors: Luis F. Caballero-castro, Dirsa Feliciano, Daniela Novoa, Orlando Arroyo, Jesús D. Villalba-morales

Abstract:

Colombia faces a critical challenge in seismic resilience due to the prevalence of informal housing, which constitutes approximately 70% of residential structures. More than 10 million Colombians (20% of the population), live in homes susceptible to collapse in the event of an earthquake. This, combined with the fact that 83% of the population is in intermediate and high seismic hazard areas, has brought serious consequences to the country. These consequences became evident during the 1999 Armenia earthquake, which affected nearly 100,000 properties and represented economic losses equivalent to 1.88% of that year's Gross Domestic Product (GDP). Despite previous efforts to reinforce informal housing through methods like externally reinforced masonry walls, alternatives related to seismic protection systems (SPDs), such as Buckling-Restrained Braces (BRB), have not yet been explored in the country. BRBs are reinforcement elements capable of withstanding both compression and tension, making them effective in enhancing the lateral stiffness of structures. In this study, the use of low-cost and easily installable BRBs for the retrofit of informal housing in Colombia was evaluated, considering the economic limitations of the communities. For this purpose, a case study was selected involving an informally constructed dwelling in the country, from which field information on its structural characteristics and construction materials was collected. Based on the gathered information, nonlinear models with and without BRBs were created, and their seismic performance was analyzed and compared through incremental static (pushover) and nonlinear dynamic analyses. In the first analysis, the capacity curve was identified, showcasing the sequence of failure events occurring from initial yielding to structural collapse. In the second case, the model underwent nonlinear dynamic analyses using a set of seismic records consistent with the country's seismic hazard. Based on the results, fragility curves were calculated to evaluate the probability of failure of the informal housings before and after the intervention with BRBs, providing essential information about their effectiveness in reducing seismic vulnerability. The results indicate that low-cost BRBs can significantly increase the capacity of informal housing to withstand earthquakes. The dynamic analysis revealed that retrofit structures experienced lower displacements and deformations, enhancing the safety of residents and the seismic performance of informally constructed houses. In other words, the use of low-cost BRBs in the retrofit of informal housing in Colombia is a promising strategy for improving structural safety in seismic-prone areas. This study emphasizes the importance of seeking affordable and practical solutions to address seismic risk in vulnerable communities in earthquake-prone regions in Colombia and serves as a model for addressing similar challenges of informal housing worldwide.

Keywords: buckling-restrained braces, fragility curves, informal housing, incremental dynamic analysis, seismic retrofit

Procedia PDF Downloads 92
3598 Improved of Elliptic Curves Cryptography over a Ring

Authors: Abdelhakim Chillali, Abdelhamid Tadmori, Muhammed Ziane

Abstract:

In this article we will study the elliptic curve defined over the ring An and we define the mathematical operations of ECC, which provides a high security and advantage for wireless applications compared to other asymmetric key cryptosystem.

Keywords: elliptic curves, finite ring, cryptography, study

Procedia PDF Downloads 369
3597 Gender Perspective in Peace Operations: An Analysis of 14 UN Peace Operations

Authors: Maressa Aires de Proenca

Abstract:

The inclusion of a gender perspective in peace operations is based on a series of conventions, treaties, and resolutions designed to protect and include women addressing gender mainstreaming. The UN Security Council recognizes that women's participation and gender equality within peace operations are indispensable for achieving sustainable development and peace. However, the participation of women in the field of peace and security is still embryonic. There are gaps when we think about female participation in conflict resolution and peace promotion spaces, and it does not seem clear how women are present in these spaces. This absence may correspond to silence about representation and the guarantee of the female perspective within the context of peace promotion. Thus, the present research aimed to describe the panorama of the participation of women who are currently active in the 14 active UN peace operations, which are: 1) MINUJUSTH, Haiti, 2) MINURSO, Western Sahara, 3) MINUSCA, Central African Republic, 4) MINUSMA, Mali, 5) MONUSCO, the Democratic Republic of the Congo, 6) UNAMID, Darfur, 7) UNDOF, Golan, 8) UNFICYP, Cyprus, 9) UNIFIL, Lebanon, 10) UNISFA, Abyei, 11) UNMIK, Kosovo, 12) UNMISS, South Sudan, 13) UNMOGIP, India, and Pakistan, and 14) UNTSO, Middle East. A database was constructed that reported: (1) position held by the woman in the peace operation, (2) her profession, (3) educational level, (4) marital status, (5) religion, (6) nationality, (8) number of years working with peace operations, (9) whether the operation in which it operates has provided training on gender issues. For the construction of this database, official reports and statistics accessed through the UN Peacekeeping Resource Hub were used; The United Nations Statistical Commission, Peacekeeping Master Open Datasets, The Armed Conflict Database (ACD), The International Institute for Strategic Studies (IISS) database; Armed Conflict Location & Event Data Project (ACLED) database; from the Evidence and Data for Gender Equality (EDGE) database. In addition to access to databases, peacekeeping operations will be contacted directly, and data requested individually. The database showed that the presence of women in these peace operations is still incipient, but growing. There are few women in command positions, and most of them occupy administrative or human-care positions.

Keywords: women, peace and security, peacekeeping operations, peace studies

Procedia PDF Downloads 134
3596 Indonesia's War on Terror and the Consequences on Indonesian Political System

Authors: Salieg L. Munestri

Abstract:

War on Terror became a principal war after the 9/11 attacks on U.S. homeland. Instead of helping to build up worldwide efforts to condemn terror and suicide bombings, the U.S.-led war on terror has given opportunities for the vast spread of terror. In much of Muslim world recently, the Bush’s Doctrine pushing all nations to choose sides in a war that is not truly a war has resulted worse effects. In the world’s most populous Muslim nation, Indonesia, more terror occurred since then. Instead of reinforcing the well-trained anti-terror military forces, Indonesian government established US-funded Special Detachment 88 to guarantee the accomplishment of war on terror in Indonesia and significantly to bring impact on regional security atmosphere. Indonesia is a potential power in Asia but it lacked off sophisticated military equipments. Consequently, Indonesia agrees to become a U.S. mutual partner in combating terrorism managed by Defense Security Cooperation Agency. The formation of elite anti-terror forces and U.S. partnerships perform Indonesia’s commitment to take a position beside the U.S. in coping with terrorism issue. However, this undeniably brings consequences on Indonesian political athmosphere, which encourages the writer to dig deep the consequences on the domestic environment of Indonesian political system. The establishment of the elite forces has aroused fluctuations within government, chiefly Indonesian House, concerning the establishment urgency, the large amount of funding, and the unpleasant performances, particularly the treatment toward suspected terrorists. Hence, evaluation process upon the Detachment 88 is highly demanding.

Keywords: anti-terror forces, Indonesia, political system, war on terror

Procedia PDF Downloads 345
3595 Assessing the Impact of Adopting Climate Smart Agriculture on Food Security and Multidimensional Poverty: Case of Rural Farm Households in the Central Rift Valley of Ethiopia

Authors: Hussien Ali, Mesfin Menza, Fitsum Hagos, Amare Haileslassie

Abstract:

Climate change has perverse effects on agricultural productivity and natural resource base, negatively affecting the well-being of the households and communities. The government and NGOs promote climate smart agricultural (CSA) practices to help farmers adapt to and mitigate the negative effects of climate change. This study aims to identify widely available CSA practices and examine their impacts on food security and multi-dimensional poverty of rural farm households in the Central Rift Valley, Ethiopia. Using three-stage proportional to size sampling procedure, the study randomly selected 278 households from two kebeles from four districts each. A cross-sectional data of 2020/21 cropping season was collected using structured and pretested survey questionnaire. Food consumption score, dietary diversity score, food insecurity experience scale, and multidimensional poverty index were calculated to measure households’ welfare indicators. Multinomial endogenous switching regression model was used to assess average treatment effects of CSA on these outcome indicators on adopter and non-adopter households. The results indicate that the widely adopted CSA practices in the area are conservation agriculture, soil fertility management, crop diversification, and small-scale irrigation. Adopter households have, on average, statistically higher food consumption score, dietary diversity score and lower food insecurity access scale than non-adopters. Moreover, adopter households, on average, have lower deprivation score in multidimensional poverty compared to non-adopter households. Up scaling the adoption of CSA practices through the improvement of households’ implementation capacity and better information, technical advice, and innovative financing mechanisms is advised. Up scaling CSA practices can further promote achieving global goals such as SDG 1, SDG 2, and SDG 13 targets, aimed to end poverty and hunger and mitigate the adverse impacts of climate change, respectively.

Keywords: climate-smart agriculture, food security, multidimensional poverty, upscaling CSA, Ethiopia

Procedia PDF Downloads 88
3594 Enhancing Signal Reception in a Mobile Radio Network Using Adaptive Beamforming Antenna Arrays Technology

Authors: Ugwu O. C., Mamah R. O., Awudu W. S.

Abstract:

This work is aimed at enhancing signal reception on a mobile radio network and minimizing outage probability in a mobile radio network using adaptive beamforming antenna arrays. In this research work, an empirical real-time drive measurement was done in a cellular network of Globalcom Nigeria Limited located at Ikeja, the headquarters of Lagos State, Nigeria, with reference base station number KJA 004. The empirical measurement includes Received Signal Strength and Bit Error Rate which were recorded for exact prediction of the signal strength of the network as at the time of carrying out this research work. The Received Signal Strength and Bit Error Rate were measured with a spectrum monitoring Van with the help of a Ray Tracer at an interval of 100 meters up to 700 meters from the transmitting base station. The distance and angular location measurements from the reference network were done with the help Global Positioning System (GPS). The other equipment used were transmitting equipment measurements software (Temsoftware), Laptops and log files, which showed received signal strength with distance from the base station. Results obtained were about 11% from the real-time experiment, which showed that mobile radio networks are prone to signal failure and can be minimized using an Adaptive Beamforming Antenna Array in terms of a significant reduction in Bit Error Rate, which implies improved performance of the mobile radio network. In addition, this work did not only include experiments done through empirical measurement but also enhanced mathematical models that were developed and implemented as a reference model for accurate prediction. The proposed signal models were based on the analysis of continuous time and discrete space, and some other assumptions. These developed (proposed) enhanced models were validated using MATLAB (version 7.6.3.35) program and compared with the conventional antenna for accuracy. These outage models were used to manage the blocked call experience in the mobile radio network. 20% improvement was obtained when the adaptive beamforming antenna arrays were implemented on the wireless mobile radio network.

Keywords: beamforming algorithm, adaptive beamforming, simulink, reception

Procedia PDF Downloads 36
3593 Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio

Authors: Mohammad Jamiu Abdullahi, Shykh Ahmed Abdussalam

Abstract:

The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence.

Keywords: Arabic Fodio Nigeria security, advocacy governance scholar Usman, British colonial perspective shaykh, leadership Islam jihad politics

Procedia PDF Downloads 329
3592 Enhancing Cooperation Between LEAs and Citizens: The INSPEC2T Approach

Authors: George Leventakis, George Kokkinis, Nikos Moustakidis, George Papalexandratos, Ioanna Vasiliadou

Abstract:

Enhancing the feeling of public safety and crime prevention are tasks customarily assigned to the Police. Police departments have, however, recognized that traditional ways of policing methods are becoming obsolete; Community Policing (CP) philosophy; however, when applied appropriately, leads to seamless collaboration between various stakeholders like the Police, NGOs and the general public and provides the opportunity to identify risks, assist in solving problems of crime, disorder, safety and crucially contribute to improving the quality of life for everyone in a community. Social Media, on the other hand, due to its high level of infiltration in modern life, constitutes a powerful mechanism which offers additional and direct communication channels to reach individuals or communities. These channels can be utilized to improve the citizens’ perception of the Police and to capture individual and community needs, when their feedback is taken into account by Law Enforcement Agencies (LEAs) in a structured and coordinated manner. This paper presents research conducted under INSPEC2T (Inspiring CitizeNS Participation for Enhanced Community PoliCing AcTions), a project funded by the European Commission’s research agenda to bridge the gap between CP as a philosophy and as an organizational strategy, capitalizing on the use of Social Media. The project aims to increase transparency, trust, police accountability, and the role of civil society. It aspires to build strong, trusting relationships between LEAs and the public, supporting two-way, contemporary communication while at the same time respecting anonymity of all affected parties. Results presented herein summarize the outcomes of four online multilingual surveys, focus group interviews, desktop research and interviews with experts in the field of CP practices. The above research activities were conducted in various EU countries aiming to capture requirements of end users from diverse backgrounds (social, cultural, legal and ethical) and determine public expectations regarding CP, community safety and crime prevention.

Keywords: community partnerships, next generation community policing, social media, public safety

Procedia PDF Downloads 343
3591 China and the Middle East in the 21st Century: From Political Mediation to Economic Expansionism

Authors: Ali Asghar Sotoudeh

Abstract:

Mediation Diplomacy has emerged as one of the main pillars of China's foreign policy goals and practices, and Beijing has established itself as a peacekeeping force in regional conflicts and crises such as Afghanistan, Syria, Sudan, Yemen, and the Arab-Israeli peace process. China is deepening and intensifying its diplomatic interventions in the Middle East and trying to shape the security and political developments in the Middle East. On the other hand, economically, China has become one of the most important trading partners with Middle Eastern governments. China is also seeking to expand its foreign policy and economic interests in the Middle East through the New Silk Road initiative and has signed cooperation agreements with 17 Arab countries. In this regard, due to the importance of the subject, this research focuses on answering this question; what is the basis of China's political mediation and economic expansionism in the Middle East? In parallel with this question, this study follows the hypothesis that the mediating role of peace is a legitimate way for China to intervene in Middle East political crises, Without causing China to deviate from its traditional guiding principles based on non-interference in the internal affairs of other actors in the international system. This policy also promotes the security of economic interests and increases the country's political influence in the Middle East. The research method is descriptive-analytical based on the qualitative method, and the data collection method is library and internet resources.

Keywords: China, middle east, political mediation, economic expansionism

Procedia PDF Downloads 139