Search results for: Bluetooth security
1665 Women Mayors and Management of Spanish Councils: An Empirical Analysis
Authors: Carmen Maria Hernandez-Nicolas, Juan Francisco Martín-Ugedo, Antonio Mínguez-Vera
Abstract:
This paper analyses the influence of gender of the mayors of Spanish local governments on different budget items using a sample of 8,243 town councils between 2002 and 2010 period and 64,361 observations. The system Generalized Method of Moments (GMM) technique was employed to examine this panel data. This powerful methodology allows controlling for the endogenity of the variables and the heterogeneity of the sample. Unlike previous works focused on the study of gender influence on firm decisions, the present work analyzes the influence of the gender of the major in the council’s decisions. Specifically, we examine the differences in financial liabilities, security, protection and social promotion expenses and income items relating to public management. In addition, the study focuses on the Spanish context, which is characterized by the presence of decentralization of public responsibility to a greater extent than in neighboring countries, feeding the debate on the operational efficiency of local government increased with an open debate on the importance of gender in public management. The results show that female mayors tend to have lower expenses in general without significant differences in incomes obtained for men and women majors. We also find that female majors incur fewer financial liabilities, one of the most important problems in the Spanish public sector. However, despite of cutting in the public sector, these councils have higher expenditure on security, protection and social promotion. According to these evidences, the presence of women in politics may serve to improve the councils’ economic situation and it is not only necessary for social justice but for economics efficiency. Besides, in councils with more inhabitants, women mayors are more common, but women who served for a very long time are less common.Keywords: councils, gender, local budgets, public management, women mayors
Procedia PDF Downloads 4001664 Islamic State: Franchising Jihad through the New Caliphate
Authors: Janiel David Melamed Visbal
Abstract:
The Islamic State has become one of the most remarkable threats for international security through their religious extremism and their establishment of a new caliphate by force. The main objective of this organization is to obtain territorial expansions beyond the Middle East and eventually to consolidate an Islamic global order based on their extremist ideology. This paper will conduct an analysis regarding how, over the past year, many jihadist organizations worldwide have pledged their alliagance to the Islamic State, transforming it into the most important jihadist franchise globally.Keywords: Islamic state, franchise, jihad, Islamic fundamentalism, caliphate
Procedia PDF Downloads 3581663 Improving Food Security and Commercial Development through Promotion of High Value Medicinal and Industrial Plants in the Swat Valley of Pakistan
Authors: Hassan Sher
Abstract:
Agriculture has a pivotal role in Pakistan’s economy, accounting for about one-fourth of the GDP and employing almost half the population. However, the competitiveness, productivity, growth, employment potential, export opportunity, and contribution to GDP of the sector is significantly hampered by agriculture marketing laws/regulations at the provincial level that reward rent seeking behavior, promote monopoly power, artificially reduce farmer incomes while inflating prices to consumers, and act as disincentives to investment. Although of more recent vintage than some other provincial agricultural marketing laws, the NWFP Agricultural and Livestock Produce Markets Act, 2007 is a throwback to a colonial paradigm, where restrictions on agricultural produce marketing and Government control of distribution channels is the norm. The Swat Valley (in which we include its tributary valleys) is an area of Pakistan in which there is poverty is both extreme and pervasive. For many, a significant portion of the family’s income comes from selling plants that are used as herbs, medicines, and perfumes. Earlier studies have shown that the benefit they derive from this work is less than they might because of: Lack of knowledge concerning which plants and which plant parts are valuable, Lack of knowledge concerning optimal preservation and storage of material, illiteracy. Another concern that much of the plant material sold from the valley is collected in the wild, without an appreciation of the negative impact continued collecting has on wild populations. We propose: Creating colored cards to help inhabitants recognize the 25 most valuable plants in their area; Developing and sharing protocols for growing the 25 most valuable plants in a home garden; Developing and sharing efficient mechanisms for drying plants so they do not lose value; Encouraging increased literacy by incorporating numbers and a few words in the handouts.Keywords: food security, medicinal plants, industrial plants, economic development
Procedia PDF Downloads 3261662 Sports Preferente Intervention as a Predictor of Sustainable Participation at Risk Teenagers in Ibadan Metropolis, Ibadan Nigerian
Authors: Felix Olajide Ibikunle
Abstract:
Introductory Statement: Sustainable participation of teenagers in sport requires deliberate and concerted plan and managerial policy rooted in the “philosophy of catch them young”. At risk, teenagers need proper integration into societal aspiration: This direction will go a long way to streamline them into the security breach and attractive nuisance free lifestyles. Basic Methodology: The population consists of children within 13-19 years old. A proportionate sampling size technique of 60% was adopted to select seven zones out of 11 geo-political zones in the Ibadan metropolis. Qualitative information and interview were used to collect needed information. Majority of the teenagers were out of school, street hawkers, motor pack, touts, and unserious vocation apprentices. These groups have the potentials of security breaches in the metropolis and beyond. Five hundred and thirty-four (534) respondents were used for the study. They were drawn from Ojoo, Akingbile, and Moniya axis = 72, Agbowo, Ajibode, and Apete axis = 74; Akobo, Basorun, and Idi-ape axis 79; Wofun, Monatan, and Iyana-Church axis = 78; Molete, Oke-ado and Oke-Bola axis = 75; Beere, Odinjo, Elekuro axis = 77; Eleyele, Ologuneru, and Alesinloye axis = 79. Major Findings: Multiple regression was used to analyze the independent variables and percentage. The respondents average age was 15.6 years old, and with 100% male. The instrument(questionnaire) used yielded; sport preference (r = 0.72); intervention (r = 0.68) and the sustainable participation (r = 0.70).The relative contributions of sport preference on participation of at risk teenagers was (F-ratio = 1.067); Intervention contribution of sport on participation of at risk teenagers = produced (F-ratio of 12.095) was significant while sustainable participation of at risk teenager produced (F-ratio = 1.062) was significant. Closing Statement: The respondents’ sport preference stimulated their participation in sport. The intervention exposed at risk-teenagers to coaching, which activated their interest and participation in sport. While sustainable participation contributed positively to evolve at risk teenagers participation in their preferred sport.Keywords: sport, preference, intervention, teenagers, sustainable, participation and risk teenagers
Procedia PDF Downloads 1121661 Assessment of Image Databases Used for Human Skin Detection Methods
Authors: Saleh Alshehri
Abstract:
Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.Keywords: image databases, image processing, pattern recognition, neural networks
Procedia PDF Downloads 2711660 Enhancing Project Success: A Case Study of Investment Strategies and Planning Practices in Rwanda’s Housing Projects Managed by Rwanda Social Security Board
Authors: Amina Umulisa
Abstract:
Background: Despite efforts to enhance profitability and project planning, Rwanda has experienced a decline in project success rates, notably in housing projects managed by the Rwanda Social Security Board (RSSB). This study aims to assess the impact of investment strategies and project planning practices on the performance of pension funds projects in Rwanda, focusing on housing projects by RSSB. Methods: Using descriptive and correlational research designs, this study surveyed 109 randomly selected respondents from a pool of 148 workers. Data analysis was conducted using descriptive and inferential statistics in STATA version 18. Results: Findings revealed that 54% of respondents acknowledged the importance of personnel generation. Additionally, 61% agreed with the effectiveness of training programs, and 79% supported the cost of human resource utilization. In terms of project management practices, 65.7% could determine when a project needed adjustments, 65.7% agreed with the approved budget, and 73% supported forecasted expenses. Furthermore, 68% agreed with order placement, 76.0% with using the right materials, and 64.4% with defining project scope. The study found significant associations between order placement and project quality outcomes (r=0.711, P-value <0.001), as well as with time management (Pearson was 0.701 and sing was 0.00) and cost management (r=0.885, P-value <0.001). Moreover, project time targets were found to significantly affect quality management (Pearson was 0.798, sing was 0.000), time management, and cost management (r=0.740, P-value <0.001). Conclusion: The findings highlight the positive association between the project implementation stage and quality management, indicating effective project planning practices among senior staff. However, there is a need to enhance project team collaboration and coordination to improve the performance of constructed houses.Keywords: project success rates, investment strategies, training programs, cost management
Procedia PDF Downloads 521659 The Effect of Technology on Legal Securities and Privacy Issues
Authors: Nancy Samuel Reyad Farhan
Abstract:
even though international crook law has grown considerably inside the ultimate decades, it still remains fragmented and lacks doctrinal cohesiveness. Its idea is defined within the doctrine as pretty disputable. there is no concrete definition of the term. in the home doctrine, the hassle of crook law troubles that rise up within the worldwide setting, and international troubles that get up in the national crook regulation, is underdeveloped each theoretically and nearly. To the exceptional of writer’s know-how, there aren't any studies describing worldwide elements of crook law in a complete way, taking a more expansive view of the difficulty. This paper provides consequences of a part of the doctoral studies, assignment a theoretical framework of the worldwide crook law. It ambitions at checking out the present terminology on international components of criminal law. It demonstrates differences among the notions of global crook regulation, criminal regulation international and law worldwide crook. It confronts the belief of crook regulation with associated disciplines and indicates their interplay. It specifies the scope of international criminal regulation. It diagnoses the contemporary criminal framework of global components of criminal regulation, referring to each crook law issues that rise up inside the international setting, and international problems that rise up within the context of national criminal law. ultimately, de lege lata postulates had been formulated and route of modifications in global criminal law turned into proposed. The followed studies hypothesis assumed that the belief of international criminal regulation became inconsistent, not understood uniformly, and there has been no conformity as to its location inside the system of regulation, objective and subjective scopes, while the domestic doctrine did not correspond with international requirements and differed from the global doctrine. applied research strategies covered inter alia a dogmatic and legal technique, an analytical technique, a comparative approach, in addition to desk studies.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 301658 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 5521657 Flexible Communication Platform for Crisis Management
Authors: Jiří Barta, Tomáš Ludík, Jiří Urbánek
Abstract:
The topics of disaster and emergency management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and data exchange. The paper suggests a solution, which allows possibilities and perspectives of new flexible communication platform to the protection of communication systems for crisis management. This platform is used for everyday communication and communication in crisis situations too.Keywords: crisis management, information systems, interoperability, crisis communication, security environment, communication platform
Procedia PDF Downloads 4751656 The Secrecy Capacity of the Semi-Deterministic Wiretap Channel with Three State Information
Authors: Mustafa El-Halabi
Abstract:
A general model of wiretap channel with states is considered, where the legitimate receiver and the wiretapper’s observations depend on three states S1, S2 and S3. State S1 is non-causally known to the encoder, S2 is known to the receiver, and S3 remains unknown. A secure coding scheme, based using structured-binning, is proposed, and it is shown to achieve the secrecy capacity when the signal at legitimate receiver is a deterministic function of the input.Keywords: physical layer security, interference, side information, secrecy capacity
Procedia PDF Downloads 3881655 Farmers’ Perception and Response to Climate Change Across Agro-ecological Zones in Conflict-Ridden Communities in Cameroon
Authors: Lotsmart Fonjong
Abstract:
The livelihood of rural communities in the West African state of Cameroon, which is largely dictated by natural forces (rainfall, temperatures, and soil), is today threatened by climate change and armed conflict. This paper investigates the extent to which rural communities are aware of climate change, how their perceptions of changes across different agro-ecological zones have impacted farming practices, output, and lifestyles, on the one hand, and the extent to which local armed conflicts are confounding their efforts and adaptation abilities. The paper is based on a survey conducted among small farmers in selected localities within the forest and savanna ecological zones of the conflict-ridden Northwest and Southwest Cameroon. Attention is paid to farmers’ gender, scale, and type of farming. Farmers’ perception of/and response to climate change are analysed alongside local rainfall and temperature data and mobilization for climate justice. Findings highlight the fact that farmers’ perception generally corroborates local climatic data. Climatic instability has negatively affected farmers’ output, food prices, standards of living, and food security. However, the vulnerability of the population varies across ecological zones, gender, and crop types. While these factors also account for differences in local response and adaptation to climate change, ongoing armed conflicts in these regions have further complicated opportunities for climate-driven agricultural innovations, inputs, and exchange of information among farmers. This situation underlines how poor communities, as victims, are forced into many complex problems outsider their making. It is therefore important to mainstream farmers’ perceptions and differences into policy strategies that consider both climate change and Anglophone conflict as national security concerns foe sustainable development in Cameroon.Keywords: adaptation policies, climate change, conflict, small farmers, cameroon
Procedia PDF Downloads 1561654 Security System for Safe Transmission of Medical Image
Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan
Abstract:
This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.Keywords: AES, DWT, genetic algorithm, watermarking
Procedia PDF Downloads 4111653 Sports Preference Intervention as a Predictor of Sustainable Participation at Risk Teenagers in Ibadan Metropolis, Ibadan Nigerian
Authors: Felix Olajide Ibikunle
Abstract:
Introductory Statement: Sustainable participation of teenagers in sports requires deliberate and concerted plans and managerial policy rooted in the “philosophy of catch them young.” At risk, teenagers need proper integration into societal aspiration: This direction will go a long way to streamline them into security breaches and attractive nuisance free lifestyles. Basic Methodology: The population consists of children between 13-19 years old. A proportionate sampling size technique of 60% was adopted to select seven zones out of 11 geo-political zones in the Ibadan metropolis. Qualitative information and interview were used to collect needed information. The majority of the teenagers were out of school, street hawkers, motor pack touts and unserious vocation apprentices. These groups have the potential for security breaches in the metropolis and beyond. Five hundred and thirty-four (534) respondents were used for the study. They were drawn from Ojoo, Akingbile and Moniya axis = 72; Agbowo, Ajibode and Apete axis = 74; Akobo, Basorun and Idi-ape axis 79; Wofun, Monatan and Iyana-Church axis = 78; Molete, Oke-ado and Oke-Bola axis = 75; Beere, Odinjo, Elekuro axis = 77; Eleyele, Ologuneru and Alesinloye axis = 79. Major Findings: Multiple regression was used to analyze the independent variables and percentages. The respondents' average age was 15.6 years old, and 100% were male. The instrument (questionnaire) used yielded; sport preference (r = 0.72), intervention (r = 0.68), and sustainable participation (r = 0.70). The relative contributions of sport preference on the participation of at risk teenagers was (F-ratio = 1.067); Intervention contribution of sport on the participation of at risk teenagers = produced (F-ratio of 12.095) was significant while, sustainable participation of at risk teenagers produced (F-ratio = 1.062) was significant. Closing Statement: The respondents’ sport preference stimulated their participation in sports. The intervention exposed at risk-teenagers to coaching, which activated their interest and participation in sports. At the same time, sustainable participation contributed positively to evolving at risk teenagers' participation in their preferred sport.Keywords: sport, preference, intervention, teenagers, sustainable, participation and risk teenagers
Procedia PDF Downloads 791652 Eating Patterns and Food Coping Strategy for Students of Prof. Dr. Hamka University During Covid-19 Pandemic
Authors: Chica Riska Ashari, Yoli Farradika
Abstract:
Background: Nutritional problems arise due to food security problems in the family, such as the ability of families to obtain food which is common in poor people due to lack of economic access to buy food. For this reason, it is hoped that there will be actions or behaviors that can be taken to fulfill their food or known as the Food Coping Strategy. The purpose of this study is to identify the eating patterns and Food Coping strategies of household students of prof. DR. HAMKA Muhammadiyah University Jakarta during the covid-19 pandemic. Methods: This study is a quantitative observational study with a cross-sectional approach. The dependent variable in this study is food coping strategies and eating patterns. The location of this research is Prof. DR. Hamka Muhammadiyah University. The population in this study were all students of Prof. DR. HAMKA Muhammadiyah University. The sampling technique is purposive sampling. The minimum number of samples in this study is 97 people with a response rate or drop out an estimate of 10%, so the total number of samples was 107 people. Statistical analysis with descriptive analysis. Results: The results showed that most of the food coping strategies were carried out by the students of the household of Prof. DR. HAMKA Muhammadiyah University, were buying the cheaper food (91.6%), then changing the priority of buying food (75.7%) and household members who carry out this food coping strategy are mothers (59.8%) then followed by students themselves (57, 9%). The diet of most students at the Prof. DR. HAMKA Muhammadiyah University in a day was fond of consuming sugar and foods containing sugar (candy, sugar, honey, sweet drinks) (98.1%) then eggs (97.2%). Conclusion: Food coping strategies are mostly used by households students at Prof. DR. HAMKA Muhammadiyah University who were buying the cheaper food and the member who did this behavior the most were the mothers. The diet of most students at Prof. DR. HAMKA Muhammadiyah University in a day was fond of consuming sugar and foods containing sugar (candy, sugar, honey, sweet drinks).Keywords: behavior, eating patterns, food coping strategies, food security, students
Procedia PDF Downloads 1831651 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan
Authors: Sehrish Qayyum
Abstract:
In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.Keywords: asymmetric warfare, psychometric analysis, PRPP, security
Procedia PDF Downloads 1361650 Improving the Logistic System to Secure Effective Food Fish Supply Chain in Indonesia
Authors: Atikah Nurhayati, Asep A. Handaka
Abstract:
Indonesia is a world’s major fish producer which can feed not only its citizens but also the people of the world. Currently, the total annual production is 11 tons and expected to double by the year of 2050. Given the potential, fishery has been an important part of the national food security system in Indonesia. Despite such a potential, a big challenge is facing the Indonesians in making fish the reliable source for their food, more specifically source of protein intake. The long geographic distance between the fish production centers and the consumer concentrations has prevented effective supply chain from producers to consumers and therefore demands a good logistic system. This paper is based on our research, which aimed at analyzing the fish supply chain and is to suggest relevant improvement to the chain. The research was conducted in the Year of 2016 in selected locations of Java Island, where intensive transaction on fishery commodities occur. Data used in this research comprises secondary data of time series reports on production and distribution and primary data regarding distribution aspects which were collected through interviews with purposively selected 100 respondents representing fishers, traders and processors. The data were analyzed following the supply chain management framework and processed following logistic regression and validity tests. The main findings of the research are as follows. Firstly, it was found that improperly managed connectivity and logistic chain is the main cause for insecurity of availability and affordability for the consumers. Secondly, lack of quality of most local processed products is a major obstacle for improving affordability and connectivity. The paper concluded with a number of recommended strategies to tackle the problem. These include rationalization of the length of the existing supply chain, intensification of processing activities, and improvement of distribution infrastructure and facilities.Keywords: fishery, food security, logistic, supply chain
Procedia PDF Downloads 2411649 Rural Territorial Sustainable Development: Interinstitutional Dialogue and Transition to Sustainable Livelihoods
Authors: Aico Nogueira
Abstract:
This paper examines the interinstitutional dialogues within the Brazilian federal structures, which comprises federal, state and local levels, around the themes of new approaches and interventions aimed to promote sustainable rural development, particularly rural development as part of a territorial approach. The work seeks to understand to what extent the various levels of the state interact with these strategies, particularly with the locally constituted powers, focusing on the importance of the transition of traditional agriculture methods to more sustainable agroecological systems and its effects on food security and sustainable rural development. The research analyses as case studies the Sustainable Rural Territories Development Program (PRONAT) of the Ministry of Agrarian Development at the federal level, as well as the State of São Paulo and the Vale do Ribeira Territory, an area characterized by environmental and social vulnerability, restrictive environmental laws and attempts to promote sustainable development. In order to examine how the interrelationships between different levels of governance and civil society, in addition to the neo-institutionalist polity centered literature, the research uses an adaptation of the concept of arena in Ostrom and Hannigan, produced at different scales of decision-making processes, as well as the multilevel governance literature. Document analysis, interviews, focus groups and direct observation techniques are also used. The main findings of this study are that how different levels of governance understand and organize themselves for this work and have a direct impact on the actions taken. Consequently, programs formulated for this purpose are not associated with the creation of institutions capable of breaking with a traditional sectoral view that has historically prevailed in policymaking. And the transition from traditional agriculture to agroecological production systems is hampered by a sectorial foundation, based on large-scale production and the strengthening of the traditional country's land concentration model.Keywords: agroecology, food security, inter-institutional dialogue, rural poverty, sustainable rural development, territorial development
Procedia PDF Downloads 2021648 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana
Authors: Tamekloe Michael Kossivi, Kenichi Matsui
Abstract:
Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation
Procedia PDF Downloads 1371647 Disaster Response Training Simulator Based on Augmented Reality, Virtual Reality, and MPEG-DASH
Authors: Sunho Seo, Younghwan Shin, Jong-Hong Park, Sooeun Song, Junsung Kim, Jusik Yun, Yongkyun Kim, Jong-Moon Chung
Abstract:
In order to effectively cope with large and complex disasters, disaster response training is needed. Recently, disaster response training led by the ROK (Republic of Korea) government is being implemented through a 4 year R&D project, which has several similar functions as the HSEEP (Homeland Security Exercise and Evaluation Program) of the United States, but also has several different features as well. Due to the unpredictiveness and diversity of disasters, existing training methods have many limitations in providing experience in the efficient use of disaster incident response and recovery resources. Always, the challenge is to be as efficient and effective as possible using the limited human and material/physical resources available based on the given time and environmental circumstances. To enable repeated training under diverse scenarios, an AR (Augmented Reality) and VR (Virtual Reality) combined simulator is under development. Unlike existing disaster response training, simulator based training (that allows remote login simultaneous multi-user training) enables freedom from limitations in time and space constraints, and can be repeatedly trained with different combinations of functions and disaster situations. There are related systems such as ADMS (Advanced Disaster Management Simulator) developed by ETC simulation and HLS2 (Homeland Security Simulation System) developed by ELBIT system. However, the ROK government needs a simulator custom made to the country's environment and disaster types, and also combines the latest information and communication technologies, which include AR, VR, and MPEG-DASH (Moving Picture Experts Group - Dynamic Adaptive Streaming over HTTP) technology. In this paper, a new disaster response training simulator is proposed to overcome the limitation of existing training systems, and adapted to actual disaster situations in the ROK, where several technical features are described.Keywords: augmented reality, emergency response training simulator, MPEG-DASH, virtual reality
Procedia PDF Downloads 3011646 Creation of S-Box in Blowfish Using AES
Authors: C. Rekha, G. N. Krishnamurthy
Abstract:
This paper attempts to develop a different approach for key scheduling algorithm which uses both Blowfish and AES algorithms. The main drawback of Blowfish algorithm is, it takes more time to create the S-box entries. To overcome this, we are replacing process of S-box creation in blowfish, by using key dependent S-box creation from AES without affecting the basic operation of blowfish. The method proposed in this paper uses good features of blowfish as well as AES and also this paper demonstrates the performance of blowfish and new algorithm by considering different aspects of security namely Encryption Quality, Key Sensitivity, and Correlation of horizontally adjacent pixels in an encrypted image.Keywords: AES, blowfish, correlation coefficient, encryption quality, key sensitivity, s-box
Procedia PDF Downloads 2261645 Rural Water Management Strategies and Irrigation Techniques for Sustainability. Nigeria Case Study; Kwara State
Authors: Faith Eweluegim Enahoro-Ofagbe
Abstract:
Water is essential for sustaining life. As a limited resource, effective water management is vital. Water scarcity has become more common due to the effects of climate change, land degradation, deforestation, and population growth, especially in rural communities, which are more susceptible to water-related issues such as water shortage, water-borne disease, et c., due to the unsuccessful implementation of water policies and projects in Nigeria. Since rural communities generate the majority of agricultural products, they significantly impact on water management for sustainability. The development of methods to advance this goal for residential and agricultural usage in the present and the future is a challenge for rural residents. This study evaluated rural water supply systems and irrigation management techniques to conserve water in Kwara State, North-Central Nigeria. Suggesting some measures to conserve water resources for sustainability, off-season farming, and socioeconomic security that will remedy water degradation, unemployment which is one of the causes of insecurity in the country, by considering the use of fabricated or locally made irrigation equipment, which are affordable by rural farmers, among other recommendations. Questionnaires were distributed to respondents in the study area for quantitative evaluation of irrigation methods practices. For physicochemical investigation, samples were also gathered from their available water sources. According to the study's findings, 30 percent of farmers adopted intelligent irrigation management techniques to conserve water resources, saving 45% of the water previously used for irrigation. 70 % of farmers practice seasonal farming. Irrigation water is drawn from river channels, streams, and unlined and unprotected wells. 60% of these rural residents rely on private boreholes for their water needs, while 40% rely on government-supplied rural water. Therefore, the government must develop additional water projects, raise awareness, and offer irrigation techniques that are simple to adapt for water management, increasing socio-economic productivity, security, and water sustainability.Keywords: water resource management, sustainability, irrigation, rural water management, irrigation management technique
Procedia PDF Downloads 1111644 Journey of Silver Workers Post Retirement in India: An Exploratory Study
Authors: Avani Maniar, Shivani Mehta
Abstract:
Population aging is one of the most challenging issues of the twenty-first century, facing both developed and developing countries worldwide. In the developed world, there has already been a substantial amount of research on aging and work to help understand the capacity and potential of older people. They attract ever ones attention. Their existence in human society gives rise to variety of responses, reactions and apprehensions, because it connotes on greater part, to some kind of compulsion or willingness that prompt elderly to decide to work after retirement. Work due to social attention and assurance for security both economical and social. In this age, elderly aspire for psychological security with due attention. But the fact remains that despite age related limitations good number of persons in their age of sixty and beyond were hunting for work that would support them and get them some kind of support and in it turns helps them to remain physically and mentally active. Based on the existing diversities in the ageing process, it may be stated that there is a need to pay greater attention to the increasing awareness on the ageing issues and its socio-economic effects and to promote the development of policies and programmes for dealing with an ageing society. Addressing the needs, wants, and well-being of elderly people is essential for maintaining a healthy productive workforce in an aging society. This paper will draw on the results of the study about reasons of elderly working post retirement, problems faced by them and about the future of retirement to ask how widespread negative attitudes and stereotypes among employers are and whether these attitudes influence behavior towards older employees. The aim of research is not only to point out certain stereotypes concerning the elderly labour force, but also to stress that unless preconditions for overcoming these stereotypes are created and employment opportunities are given to this segment of the labour force, full employment as an ultimate goal of global economic policy cannot be achieved.Keywords: employers, India, inequality, problems, reasons of working, silver workers
Procedia PDF Downloads 1601643 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks
Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev
Abstract:
One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications
Procedia PDF Downloads 2171642 Organic Agriculture in Pakistan: Opportunities, Challenges, and Future Directions
Authors: Sher Ali
Abstract:
Organic agriculture has gained significant momentum globally as a sustainable and environmentally friendly farming practice. In Pakistan, amidst growing concerns about food security, environmental degradation, and health issues related to conventional farming methods, the adoption of organic agriculture presents a promising pathway for agricultural development. This abstract aims to provide an overview of the status, opportunities, challenges, and future directions of organic agriculture in Pakistan. It delves into the current state of organic farming practices, including the extent of adoption, key crops cultivated, and the regulatory framework governing organic certification. Furthermore, the abstract discusses the unique opportunities that Pakistan offers for organic agriculture, such as its diverse agro-climatic zones, rich biodiversity, and traditional farming knowledge. It highlights successful initiatives and case studies that showcase the potential of organic farming to improve rural livelihoods, enhance food security, and promote sustainable agricultural practices. However, the abstract also addresses the challenges hindering the widespread adoption of organic agriculture in Pakistan, ranging from limited awareness and technical know-how among farmers to inadequate infrastructure and market linkages. It emphasizes the need for supportive policies, capacity-building programs, and investment in research and extension services to overcome these challenges and promote the growth of the organic agriculture sector. Lastly, the abstract outlines future directions and recommendations for advancing organic agriculture in Pakistan, including strategies for scaling up production, strengthening certification mechanisms, and fostering collaboration among stakeholders. By shedding light on the opportunities, challenges, and potential of organic agriculture in Pakistan, this abstract aims to contribute to the discourse on sustainable farming practices at the upcoming Agro Conference in the USA. It invites participants to engage in dialogue, share experiences, and explore avenues for collaboration toward promoting organic agriculture for a healthier, more resilient food system.Keywords: agriculture, challenges, organic, Pakistan
Procedia PDF Downloads 521641 WAQF Financing Using WAQF Sukuk in Iran
Authors: Meysam Doaei, Mojtaba Kavand
Abstract:
WAQF as a part of Islamic social security system is developed in Islam. Traditional WAQF has some limitations which are resolved in WAQF Sukuk. In regard to acceptability of Islamic finance in the world, WAQF Sukuk also has been developing in Islamic countries. In this paper, concept of WAQF, traditional and modern WAQF financing are presented. Then, WAQF Sukuk, its application and its model in Iran are developed.Keywords: Al-mawqūfat development, traditional financing, modern financing, WAQF Sukuk
Procedia PDF Downloads 5231640 Determining Factors for Opening Accounts, Customers’ Perception and Their Satisfaction Level Towards the First Security Islamic Bank of Bangladesh
Authors: Md. Akiz Uddin
Abstract:
This research attempted to identify the determining factors that extensively persuaded customers of the First Security Islamic Bank Limited (FSIBL) to open accounts and their perception and satisfaction level towards it. Initially, a theoretical model was established based on existing literature reviews. After that, a self-administered structured questionnaire was developed, and data were collected from 180 customers of the FSIBL of Bangladesh using purposive sampling technique. The collected data were later analyzed through a statistical software. Structural Equation Modelling (SEM) was used to verify the model of the study and test the hypotheses. The study particularly examined the determinants of opening accounts, customers’ perception and their satisfaction level towards the bank on several factors like the bank’s compliance with Shariah law, use of modern technology, assurance, reliability, empathy, profitability, and responsiveness. To examine the impact of religious belief on being FSIBL clients, the study also investigates non-Muslim clients’ perception about FSIBL. The study focused on FSIBL customers only from five branches of Dhaka city. The study found that the religious beliefs is the most significant factors for Muslim customers for considering FSIBL to open an account, and they are satisfied with the services, too. However, for non-Muslim customers, other benefits like E-banking, various user-friendly services are the most significant factors for choosing FSIBL. Their satisfaction level is also statistically significant. Furthermore, even if the non- Muslim customers didn’t consider religious beliefs as determinant factors for choosing FSIBL, the respondents informed that they have trust that people who believe in shariah law are more reliable to keep money with them. These findings open up the avenue for future researchers to conduct more study in this area through employing a larger sample size and more branches and extending the current model by incorporating new variables. The study will be an important addition to the potentials of Islamic banking system, literature of service quality and customer satisfaction level, particularly in the success of Islamic banking system in Bangladesh.Keywords: islamic banking, customers’ satisfaction, customers’ perception, shariah law
Procedia PDF Downloads 761639 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors
Authors: Lok Yi Joyce Poon
Abstract:
China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay
Procedia PDF Downloads 3931638 Privatising Higher Education: Imparting Quality in Academics
Authors: Manish Khanna
Abstract:
Higher education seeks to preserve, transmit and advance knowledge. It is one of the most important instruments of change and progress. The observation of Kothari Commission (1964-66) is true even today; The destiny of India is now being shaped in her classrooms. This, we believe, is no more rhetoric. In the world based on science and technology it is education that determines the level of prosperity, welfare, and security of the people. On the quality and number of persons coming out of our schools and colleges will depend our success in the great enterprise of national reconstruction.Keywords: higher education, quality in academics, Kothari commission, privatising higher education
Procedia PDF Downloads 4811637 Measuring Stakeholder Engagement and Drivers of Success in Ethiopian Tourism Sector
Authors: Gezahegn Gizaw
Abstract:
The FDRE Tourism Training Institute organizes forums for debates, best practices exchange and focus group discussions to forge a sustainable and growing tourism sector while minimizing negative impacts on the environment, communities, and cultures. This study aimed at applying empirical research method to identify and quantify relative importance of success factors and individual engagement indicators that were identified in these forums. Response to the 12-question survey was collected from a total of 437 respondents in academic training institutes (212), business executive and employee (204) and non-academic government offices (21). Overall, capacity building was perceived as the most important driver of success for stakeholder engagement. Business executive and employee category rated capacity building as the most important driver of success (53%), followed by decision-making process (27%) and community participation (20%). Among educators and students, both capacity building and decision-making process were perceived as the most important factors (40% of respondents), whereas community participation was perceived as the most important success factor only by 20% of respondents. Individual engagement score in capacity building, decision-making process and community participation showed highest variability by educational level of participants (variance of 3.4% - 5.2%, p<0.001). Individual engagement score in capacity building was highly correlated to perceived benefit of training on improved efficiency, job security, higher customer satisfaction and self-esteem. On the other hand, individual engagement score in decision making process was highly correlated to its perceived benefit on lowering business costs, improving ability to meet the needs of a target market, job security, self-esteem and more teamwork. The study provides a set of recommendations that help educators, business executives and policy makers to maximize the individual and synergetic effect of training, decision making process on sustainability and growth of the tourism sector in Ethiopia.Keywords: engagement score, driver of success, capacity building, tourism
Procedia PDF Downloads 771636 Safe and Scalable Framework for Participation of Nodes in Smart Grid Networks in a P2P Exchange of Short-Term Products
Authors: Maciej Jedrzejczyk, Karolina Marzantowicz
Abstract:
Traditional utility value chain is being transformed during last few years into unbundled markets. Increased distributed generation of energy is one of considerable challenges faced by Smart Grid networks. New sources of energy introduce volatile demand response which has a considerable impact on traditional middlemen in E&U market. The purpose of this research is to search for ways to allow near-real-time electricity markets to transact with surplus energy based on accurate time synchronous measurements. A proposed framework evaluates the use of secure peer-2-peer (P2P) communication and distributed transaction ledgers to provide flat hierarchy, and allow real-time insights into present and forecasted grid operations, as well as state and health of the network. An objective is to achieve dynamic grid operations with more efficient resource usage, higher security of supply and longer grid infrastructure life cycle. Methods used for this study are based on comparative analysis of different distributed ledger technologies in terms of scalability, transaction performance, pluggability with external data sources, data transparency, privacy, end-to-end security and adaptability to various market topologies. An intended output of this research is a design of a framework for safer, more efficient and scalable Smart Grid network which is bridging a gap between traditional components of the energy network and individual energy producers. Results of this study are ready for detailed measurement testing, a likely follow-up in separate studies. New platforms for Smart Grid achieving measurable efficiencies will allow for development of new types of Grid KPI, multi-smart grid branches, markets, and businesses.Keywords: autonomous agents, Distributed computing, distributed ledger technologies, large scale systems, micro grids, peer-to-peer networks, Self-organization, self-stabilization, smart grids
Procedia PDF Downloads 300