Search results for: state security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9533

Search results for: state security

8333 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 139
8332 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 280
8331 The Relationship between Level of Anxiety and the Development of Children with Growth Hormone Deficiency

Authors: Ewa Mojs, Katarzyna Wiechec, Maia Kubiak, Wlodzimierz Samborski

Abstract:

Interactions between mother’s psychological condition and child’s health status are complex and derive from the nature of the mother-child relationship. The aim of the study was to analyze the issue of anxiety amongst mothers of short children in the aspect of growth hormone therapy. The study was based on a group of 101 mothers of originally short-statured children – 70 with growth hormone deficiency (GHD) treated with recombinant human growth hormone (rhGH) and 31 undergoing the diagnostic process, without any treatment. Collected medical data included child's gender, height and weight, chronological age, bone age delay, and rhGH therapy duration. For all children, the height SDS and BMI SDS were calculated. To evaluate anxiety in mothers, the Spielberger State-Trait Anxiety Inventory (STAI) was used. Obtained results revealed low trait anxiety levels, with no statistically significant differences between the groups. State anxiety levels were average when mothers of all children were analyzed together, but when divided into groups, statistical differences appeared. Mothers of children without diagnosis and treatment had significantly higher levels of state anxiety than mothers of children with GHD receiving appropriate therapy. These results show, that the occurrence of growth failure in children is not related to high maternal trait anxiety, but the lack of diagnosis and lack of appropriate treatment generates higher levels of maternal state anxiety than the process of rh GH therapy in the offspring. Commencement of growth hormone therapy induce a substantial reduction of the state anxiety in mothers, and the duration of treatment causes its further decrease.

Keywords: anxiety, development, growth hormone deficiency, motherhood

Procedia PDF Downloads 276
8330 Major Gullies Erosion Sites and Volume of Soil Loss in Edo State, Nigeria

Authors: Augustine Osayande

Abstract:

This research is on Major Gullies Erosion Sites and Volume of Soil Loss in Edo State, Nigeria. The primary objective was to identify notable gullies sites and quantify the volume of soil loss in the study area. Direct field observation and measurement of gullies dimensions was done with the help of research assistants using a measuring tape, Camera and 3percent accuracy Global Positioning System (GPS). The result revealed that notable gullies in the area have resulted in the loss of lives and properties, destruction of arable lands and wastage of large areas of usable lands. Gullies in Edo North have Mean Volume of Soil Loss of 614, 763.33 m³, followed by Edo South with 79,604.76 m³ and Edo Central is 46,242.98 m³ and as such an average of 1,772, 888.7m3 of soil is lost annually in the study area due to gully erosion problem. The danger of gully erosion in helpless regions like Edo State called for urgent remedies in order to arrest the further loss of soil, buildings and other properties.

Keywords: Edo, magnitude, gully, volume, soil, sloss

Procedia PDF Downloads 131
8329 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 331
8328 Applying Multivariate and Univariate Analysis of Variance on Socioeconomic, Health, and Security Variables in Jordan

Authors: Faisal G. Khamis, Ghaleb A. El-Refae

Abstract:

Many researchers have studied socioeconomic, health, and security variables in the developed countries; however, very few studies used multivariate analysis in developing countries. The current study contributes to the scarce literature about the determinants of the variance in socioeconomic, health, and security factors. Questions raised were whether the independent variables (IVs) of governorate and year impact the socioeconomic, health, and security dependent variables (DVs) in Jordan, whether the marginal mean of each DV in each governorate and in each year is significant, which governorates are similar in difference means of each DV, and whether these DVs vary. The main objectives were to determine the source of variances in DVs, collectively and separately, testing which governorates are similar and which diverge for each DV. The research design was time series and cross-sectional analysis. The main hypotheses are that IVs affect DVs collectively and separately. Multivariate and univariate analyses of variance were carried out to test these hypotheses. The population of 12 governorates in Jordan and the available data of 15 years (2000–2015) accrued from several Jordanian statistical yearbooks. We investigated the effect of two factors of governorate and year on the four DVs of divorce rate, mortality rate, unemployment percentage, and crime rate. All DVs were transformed to multivariate normal distribution. We calculated descriptive statistics for each DV. Based on the multivariate analysis of variance, we found a significant effect in IVs on DVs with p < .001. Based on the univariate analysis, we found a significant effect of IVs on each DV with p < .001, except the effect of the year factor on unemployment was not significant with p = .642. The grand and marginal means of each DV in each governorate and each year were significant based on a 95% confidence interval. Most governorates are not similar in DVs with p < .001. We concluded that the two factors produce significant effects on DVs, collectively and separately. Based on these findings, the government can distribute its financial and physical resources to governorates more efficiently. By identifying the sources of variance that contribute to the variation in DVs, insights can help inform focused variation prevention efforts.

Keywords: ANOVA, crime, divorce, governorate, hypothesis test, Jordan, MANOVA, means, mortality, unemployment, year

Procedia PDF Downloads 268
8327 Children in Conflict: Institutionalization as a Rehabilitative Mechanism in Jammu and Kashmir

Authors: Moksha Singh

Abstract:

The proponents of deinstitutionalization, including Goffman and others, in their works, have regarded institutions (orphanages to be specific) as regulated social arrangements that negatively impinge upon a resident’s development. They, therefore, propose alternative forms of care. However, even after five decades of this critique institutionalization remains the only hope for children with social, physical and mental disabilities in larger parts of the developing world such as the conflict affected state of Jammu and Kashmir in India. This paper is based on the experiences of children who lost their parents to insurgency and counter-insurgency operations and the rehabilitation process. This study is qualitative in nature and adopts descriptive-cum-exploratory research design. Using theoretical sampling, six orphanages and thirty one child residents who lost their parent(s) in the course of the armed conflict in the state of Jammu and Kashmir in India were studied in the year 2009-2010. It included interviews, observation, life histories and introspective accounts of the orphans and the management. The results were drawn through the qualitative examination, understanding, and interpretation of the primary and secondary data. The findings suggested that rehabilitation of these conflict-affected children is taking place mainly through residential child care facilities run by non-governmental bodies. Alternative forms of rehabilitation are not functional in the state because of various geopolitical and socio-cultural complexities. Even after five years of arriving at these conclusions and more, the state of Jammu and Kashmir still lacks a comprehensive rehabilitation plan for these children. This has further encouraged a mushroomed growth of legal and illegal institutions. Some of these institutions compromise the standard norms of functioning and yet remain the only hope for thousands rendered orphan. These institutions, therefore, are there to stay as other alternative forms of care are not available in the state. A comprehensive intervention policy is needed based on the cultural specifics of the state and incorporation of views of institutions offering aid, the state and the children. The paper introduces Small Group Residential Care Model through which it is expected that the restoration process can be made smooth and effective.

Keywords: armed conflict, children's rights, institutionalization, orphanages, rehabilitation

Procedia PDF Downloads 233
8326 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy

Authors: J.T. Chivanga

Abstract:

This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.

Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora

Procedia PDF Downloads 232
8325 The Impact of Corporate Social Responsibility on Tertiary Institutions in Bauchi State Nigeria

Authors: Aliyu Aminu Baba, Mustapha Makama

Abstract:

Tertiary institutions are citadel of learning and societal orientation. Due to the huge investment of various government to tertiary institutions, these institutions are solely financed by the government alone. As stakeholders of society, corporations have to have to intervene and provide corporate social responsibility. The study intends to investigate the role of Entrepreneurs in incorporating social Responsibility. Tertiary institutions are citadel of learning and societal orientation. Due to the huge investment of various government to tertiary institutions, the study intends to investigate the role of businesses and Entrepreneurs, which could be among the important contributions of businesses and Entrepreneurs on corporate social Responsibility to Tertiary Institutions in Bauchi State. Corporate social responsibility is vital in enhancing the infrastructural development of the tertiary institution as almost all individuals and corporate bodies benefit from this tertiary institutions. The study intends to examine the impact of corporate social responsibility to tertiary institutions and entrepreneurs in Bauchi state Nigeria. Questionnaires would be distributed to tertiary institutions and entrepreneurs in the Bauchi metropolis. The data collected will be analyzed with the help of SPSS version 23. The main objective is to investigate the role of businesses and Entrepreneurs, which could be among the important contributions of businesses and entrepreneurs on corporate social Responsibility to Tertiary Institutions in Bauchi State.

Keywords: corporate social responsibility, tertiary, institutions, profitability

Procedia PDF Downloads 219
8324 The Valorisation of Dredged Sediment in the Self Compacting Concrete

Authors: N. Bouhamou, F. Mostefa, A. Mebrouki, N. Belas

Abstract:

Every year, millions of cube meters are dredged from dams and restraints as an entertaining and prevention procedure all over the world. These dredged sediments are considered as natural waste leading to an environmental, ecological and even an economical problem in their processing and deposing. Nevertheless, in the context of the sustainable development policy, a way of management is opened aiming to the valorization of sediments as a building material and particularly as a new binder that can be industrially exploited and that improve the physical, chemical and mechanical characteristics of the concrete. This study is a part of the research works realized in the civil engineering department at the university of Mostaganem (Algeria), on the impact of the dredged mud of Fergoug dam on the behaviour of self-consolidating concrete in fresh and hardened state, such as the mechanical performance of SCC and its impact on the differed deformations (shrinkage). The work aims to valorize this mud in SCC and to show eventual interactions between constituents. The results obtained presents a good perspectives in order to perform SCC based in calcined mud.

Keywords: sediment, calcination, reuse, self-consolidating concrete, fresh state, hard state, shrinkage

Procedia PDF Downloads 377
8323 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 219
8322 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 62
8321 The Effect of the Dramas on the Egyptian Public Opinion Regarding the State of Israel: A Survey Study on the Egyptian Youth at Cairo University

Authors: Dana Hisham Mohamed Abdrabo

Abstract:

The paper examines the effect of Drama works on the Egyptian public opinion regarding the religion of Judaism, Israel as a state and the Jew's image to Egyptian Muslims. The paper examines the role of Media and in particular, Dramas on achieving interreligious dialogue between Judaism and Islam and its role in making peace between the Egyptian Muslims -and Arabs in general- on the one hand, and the Jew on the other hand, and the implications of this on the relationship between Arab countries and Israel as a state. The research uses the Survey method with Egyptian Muslims as a main sample for the research to examine such effect. Dramas have a role in presenting the Jew, Judaism, and Israel as a state and as a political system in various ways. The paper is related to multidisciplinary fields; it is related to political sciences, political sociology, communication, social change, and cognitive sociology fields. The research adds a new analytical study for a new tool for the peacemaking process in the Middle East region through adopting an interdisciplinary approach which is needed in the studies aim to achieve stability and peace in the Middle East region and its neighboring countries.

Keywords: dramas tool, Egyptian public opinion, interreligious dialogue, Israel & Egyptian relations , Judaism

Procedia PDF Downloads 200
8320 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 37
8319 An Adaptive Controller Method Based on Full-State Linear Model of Variable Cycle Engine

Authors: Jia Li, Huacong Li, Xiaobao Han

Abstract:

Due to the more variable geometry parameters of VCE (variable cycle aircraft engine), presents an adaptive controller method based on the full-state linear model of VCE and has simulated to solve the multivariate controller design problem of the whole flight envelops. First, analyzes the static and dynamic performances of bypass ratio and other state parameters caused by variable geometric components, and develops nonlinear component model of VCE. Then based on the component model, through small deviation linearization of main fuel (Wf), the area of tail nozzle throat (A8) and the angle of rear bypass ejector (A163), setting up multiple linear model which variable geometric parameters can be inputs. Second, designs the adaptive controllers for VCE linear models of different nominal points. Among them, considering of modeling uncertainties and external disturbances, derives the adaptive law by lyapunov function. The simulation results showed that, the adaptive controller method based on full-state linear model used the angle of rear bypass ejector as input and effectively solved the multivariate control problems of VCE. The performance of all nominal points could track the desired closed-loop reference instructions. The adjust time was less than 1.2s, and the system overshoot was less than 1%, at the same time, the errors of steady states were less than 0.5% and the dynamic tracking errors were less than 1%. In addition, the designed controller could effectively suppress interference and reached the desired commands with different external random noise signals.

Keywords: variable cycle engine (VCE), full-state linear model, adaptive control, by-pass ratio

Procedia PDF Downloads 309
8318 Strong Down-Conversion Emission of Sm3+ Doped Borotellurite Glass under the 480nm Excitation Wavelength

Authors: M. R. S. Nasuha, K. Azman, H. Azhan, S. A. Senawi, A. Mardhiah

Abstract:

Studies on Samarium doped glasses possess lot of interest due to their potential applications for high-density optical memory, optical communication device, the design of laser and color display etc. Sm3+ doped borotellurite glasses of the system (70-x) TeO2-20B2O3-10ZnO-xSm2O3 (where x = 0.0, 0.5, 1.0, 1.5, 2.0 and 2.5 mol%) have been prepared using melt-quenching method. Their physical properties such as density, molar volume and oxygen packing density as well as the optical measurements by mean of their absorption and emission characteristic have been carried out at room temperature using UV/VIS and photoluminescence spectrophotometer. The results of physical properties are found to vary with respect to Sm3+ ions content. Meanwhile, three strong absorption peaks are observed and are well resolved in the ultra violet and visible regions due to transitions between the ground state and various excited state of Sm3+ ions. Thus, the photoluminescence spectra exhibit four emission bands from the initial state, which correspond to the 4G5/2 → 6H5/2, 4G5/2 → 6H7/2, 4G5/2 → 6H9/2 and 4G5/2 → 6H11/2 fluorescence transitions at 562 nm, 599 nm, 645 nm and 706 nm respectively.

Keywords: absorption, borotellurite, down-conversion, emission

Procedia PDF Downloads 679
8317 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 57
8316 Ideology-Induced Contexts in the Conceptualization of 'the Islamic State' in Political Cartoons

Authors: Rim Baroudi

Abstract:

The notion of the context-induced metaphors refers to the role of different contextual aspects (socio-cultural, linguistic, bodily-physical, and ideological) in affecting metaphor production. This has not been investigated in visual discourse. This paper intends to extend the focus of this research interest to study context-induced metaphors in newspapers’ cartoons. It seeks to account for different contextual variables influencing the production of metaphors in cartoons placing special focus on the ideological variable. The aim is to demonstrate how different contextual aspects are conditioned by the ideological variable. The study applied critical metaphor approach to analyse contextual variables shaping the conceptualization of ‘the Islamic State’ in the cartoons of 3 newspapers (Al-Ryadh newspaper, Tehran Times, and The New York Times). Findings have revealed the decisive role of the ideological context in conditioning and priming the rest of contextual variables in the conceptualisation of ‘the Islamic State’ in political cartoons of the three newspapers. These findings bear special importance to the study of bodily-physical and socio-cultural variables inducing and shaping political cognition in political cartoons in a way consistent with the ideological framework within which newspapers operate.

Keywords: context-induced metaphors, ideological context, the Islamic State, political cartoons

Procedia PDF Downloads 287
8315 The Folksongs of Jharkhand: An Intangible Cultural Heritage of Tribal India

Authors: Walter Beck

Abstract:

Jharkhand is newly constituted 28th State in the eastern part of India which is known for the oldest settlement of the indigenous people. In the State of Jharkhand in which broadly three language family are found namely, Austric, Dravidian, and Indo-European. Ex-Mundari, kharia, Ho Santali come from the Austric Language family. Kurukh, Malto under Dravidian language family and Nagpuri Khorta etc. under Indo-European language family. There are 32 Indigenous Communities identified as Scheduled Tribe in the State of Jharkhand. Santhal, Munda, Kahria, Ho and Oraons are some of the major Tribe of the Jharkhand state. Jharkhand has a Rich Cultural heritage which includes Folk art, folklore, Folk Dance, Folk Music, Folk Songs for which diversity can been seen from place to place, season to season and all traditional Culture and practices. The languages as well as the songs are vulnerable to dominant culture and hence needed to be protected. The collection and documentation of these songs in their natural setting adds significant contribution to the conservation and propagation of the cultural elements. This paper reflects to bring out the Originality of the Collected Songs from remote areas of the plateau of Sothern Jharkhand as a rich intangible Cultural heritage of the Country. The research was done through participatory observation. In this research project more than 100 songs which were never documented before.

Keywords: cultural heritage, India, indigenous people, songs, languages

Procedia PDF Downloads 197
8314 The Potential of Small-Scale Urban Food Growing to Supplement Households’ Diets and Provide Health and Wellbeing Benefits

Authors: Bethany Leake, Samantha Caton, Paul Norman, Jill Edmondson

Abstract:

With the majority of the UK population residing in urban areas and with the pressures both environmentally and socially on rural agriculture, the role of urban food production, particularly urban horticulture (UH), is increasingly important in the future of UK food security. UH has the potential to provide an important contribution to urban diets and to provide additional benefits to human health and well-being. While allotments are the traditional focus of UH and play an important role, as access to this type of land is limited and unequal across cities, other forms of UH space, such as domestic growing, will need to be utilized to provide a significant contribution to urban diets. It is theorized that this smaller scale of growing may also be a more accessible way of engaging novice growers in UH. A collaborative research project, Urban Harvest, was designed between the University of Sheffield and Sheffield-based food organizations, which aimed to engage inexperienced gardeners in UH by providing them with home food-growing kits (Grow-Kits). Grow-Kits were provided to 189 participants across Sheffield in 2022, 48% of whom had never grown food before. Data collected through surveys and interviews will help us to evaluate the effect of small-scale food growing on health and wellbeing and the potential of this type of scheme to encourage future UH engagement. This data and increasing evidence on the co-benefits of UH have important implications not only for local food security but also for urban health inequalities and the potential use of this activity for preventative healthcare.

Keywords: urban horticulture, health and wellbeing, food security, nutrition

Procedia PDF Downloads 68
8313 The Reality of Food Scarcity in Madhya Pradesh: Is It a Glimpse or Not?

Authors: Kalyan Sundar Som, Ghanshyam Prasad Jhariya

Abstract:

Population growth is an important pervasive phenomenon in the world. Its survival depends upon many daily needs and food is one of them. Population factors play a decisive role in the human endeavor to attain food. Nutrition and health status compose integral part of human development and progress of a society. Therefore, the neglect any one of these components may leads to the deterioration of the quality of life. Food is also intimately related with economic growth and social progress as well as with political stability and peace. It refers to the availability of food and its access to it. It can be observed from global to local level. Food scarcity has emerged as a matter of great concern all over the world due to uncontrolled and unregulated growth of population .For this purpose this study try to find out the deficit or surplus production of food availability in terms of their total population in the study area. It also ascertains the population pressure, demand and supply of food stuff and demarcation of insecure areas.The data base of the study under discussion includes government published data regarding agriculture production, yield and cropped area in 2005-06 to 2011-12 available at commissioner land record Madhya Pradesh, Gwalior. It also includes the census of India for population data. For measuring food security or insecurity regions is based on the consumption of net food available in terms caloric value minus the consumption by the weighted total population. This approach has been adopted because the direct estimate of production and consumption is the only reliable way to ascertain food security in a unit area and to compare one area with another (Noor Mohammad, dec. 2002). The scenario in 2005-06 is 57.78 percent district has food insufficient in terms of their population. On the other hand after 5 years, there are only 22 % districts are deficit in term of food availability where Burhanpur is the most deficit (56 percent) district. While 20% district are highly surplus district in the state where Harda and Hoshangabad districts are very high surplus district (5 times and 3.95 times) in term of food availability(2011). The drastic change (agriculture transformation) is happen due government good intervention in the agricultural sector.

Keywords: agriculture transformation, caloric value method, deficit or surplus region, population pressure

Procedia PDF Downloads 428
8312 Stakeholders Views on Why Childhood Obesity is Rising in Lagos, Nigeria

Authors: A. A. Adedini, B. A. Aina, P. U. Ogbo

Abstract:

Child obesity is on the rise globally. According to the World Health Organization, the number of obese children would increase to 70 million by 2025 if no intervention is made. An increase in the prevalence of overweight and obesity amongst school children in Lagos State, Nigeria has been established but specific factors promoting its prevalence are unknown. This aim of this study is to identify the commonly expressed factor(s) responsible for the rise in prevalence of child overweight and obesity in Lagos, Nigeria. Five focus group discussions were conducted with different groups of stake-holders involved in child care, namely: parents, teachers and health workers. Participants were recruited using a purposive sampling method; a validated question guide was employed for the discussion sessions. The discussions were recorded, collated, analysed using Grounded theory to extract themes. Six themes emerged from the discussions as follows: Civilization and lifestyle imbalance resulting from busy work schedules of young mothers leading to adoption of westernized culture promoting preference for processed and fast food meals; insecurity and congestion of the state which discourages out-door activities; ignorance of the populace on the prevalence of child obesity in the state; inadequate educative and enlightenment programmes in schools and by the Nigerian government; myths on child care and body physique and societal perceptions of the children born into affluent homes. Some of the factors responsible for the rise in the prevalence of child obesity in Lagos, Nigeria have been identified. Preventive strategies to control the prevalence of obesity in children residing in Lagos state is considered for further studies.

Keywords: Childhood Obesity, factors, lagos state, stakeholders

Procedia PDF Downloads 362
8311 A Flexible Bayesian State-Space Modelling for Population Dynamics of Wildlife and Livestock Populations

Authors: Sabyasachi Mukhopadhyay, Joseph Ogutu, Hans-Peter Piepho

Abstract:

We aim to model dynamics of wildlife or pastoral livestock population for understanding of their population change and hence for wildlife conservation and promoting human welfare. The study is motivated by an age-sex structured population counts in different regions of Serengeti-Mara during the period 1989-2003. Developing reliable and realistic models for population dynamics of large herbivore population can be a very complex and challenging exercise. However, the Bayesian statistical domain offers some flexible computational methods that enable the development and efficient implementation of complex population dynamics models. In this work, we have used a novel Bayesian state-space model to analyse the dynamics of topi and hartebeest populations in the Serengeti-Mara Ecosystem of East Africa. The state-space model involves survival probabilities of the animals which further depend on various factors like monthly rainfall, size of habitat, etc. that cause recent declines in numbers of the herbivore populations and potentially threaten their future population viability in the ecosystem. Our study shows that seasonal rainfall is the most important factors shaping the population size of animals and indicates the age-class which most severely affected by any change in weather conditions.

Keywords: bayesian state-space model, Markov Chain Monte Carlo, population dynamics, conservation

Procedia PDF Downloads 196
8310 Formal Implementation of Routing Information Protocol Using Event-B

Authors: Jawid Ahmad Baktash, Tadashi Shiroma, Tomokazu Nagata, Yuji Taniguchi, Morikazu Nakamura

Abstract:

The goal of this paper is to explore the use of formal methods for Dynamic Routing, The purpose of network communication with dynamic routing is sending a massage from one node to others by using pacific protocols. In dynamic routing connections are possible based on protocols of Distance vector (Routing Information Protocol, Border Gateway protocol), Link State (Open Shortest Path First, Intermediate system Intermediate System), Hybrid (Enhanced Interior Gateway Routing Protocol). The responsibility for proper verification becomes crucial with Dynamic Routing. Formal methods can play an essential role in the Routing, development of Networks and testing of distributed systems. Event-B is a formal technique consists of describing rigorously the problem; introduce solutions or details in the refinement steps to obtain more concrete specification, and verifying that proposed solutions are correct. The system is modeled in terms of an abstract state space using variables with set theoretic types and the events that modify state variables. Event-B is a variant of B, was designed for developing distributed systems. In Event-B, the events consist of guarded actions occurring spontaneously rather than being invoked. The invariant state properties must be satisfied by the variables and maintained by the activation of the events.

Keywords: dynamic rout RIP, formal method, event-B, pro-B

Procedia PDF Downloads 395
8309 Dynamics of Hybrid Language in Urban and Rural Uttar Pradesh India

Authors: Divya Pande

Abstract:

The dynamics of culture expresses itself in language. Even after India got independence in 1947 English subtly crept in the language of the masses with a silent and powerful flow towards the vernacular. The culture contact resulted in learning and emergence of a new language across the Hindi speaking belt of Northern and Central India. The hybrid words thus formed displaced the original word and got contextualized and absorbed in the language of the common masses. The research paper explores the interesting new vocabulary used extensively in the urban and rural districts of the state of Uttar- Pradesh which is the most populous state of India. The paper adopts a two way classification- formal and contextual for the analysis of the hybrid vocabulary of the linguistic items where one element is necessarily from the English language and the other from the Hindi. The new vocabulary represents languages of the wider world cutting across the geographical and the cultural barriers. The paper also broadly points out to the Hinglish commonly used in the state.

Keywords: assimilation, culture contact, Hinglish, hybrid words

Procedia PDF Downloads 393
8308 Wind Power Forecasting Using Echo State Networks Optimized by Big Bang-Big Crunch Algorithm

Authors: Amir Hossein Hejazi, Nima Amjady

Abstract:

In recent years, due to environmental issues traditional energy sources had been replaced by renewable ones. Wind energy as the fastest growing renewable energy shares a considerable percent of energy in power electricity markets. With this fast growth of wind energy worldwide, owners and operators of wind farms, transmission system operators, and energy traders need reliable and secure forecasts of wind energy production. In this paper, a new forecasting strategy is proposed for short-term wind power prediction based on Echo State Networks (ESN). The forecast engine utilizes state-of-the-art training process including dynamical reservoir with high capability to learn complex dynamics of wind power or wind vector signals. The study becomes more interesting by incorporating prediction of wind direction into forecast strategy. The Big Bang-Big Crunch (BB-BC) evolutionary optimization algorithm is adopted for adjusting free parameters of ESN-based forecaster. The proposed method is tested by real-world hourly data to show the efficiency of the forecasting engine for prediction of both wind vector and wind power output of aggregated wind power production.

Keywords: wind power forecasting, echo state network, big bang-big crunch, evolutionary optimization algorithm

Procedia PDF Downloads 561
8307 Ambivilance, Denial, and Adaptive Responses to Vulnerable Suspects in Police Custody: The New Limits of the Sovereign State

Authors: Faye Cosgrove, Donna Peacock

Abstract:

This paper examines current state strategies for dealing with vulnerable people in police custody and identifies the underpinning discourses and practices which inform these strategies. It has previously been argued that the state has utilised contradictory and conflicting responses to the control of crime, by employing opposing strategies of denial and adaptation in order to simultaneously both display sovereignty and disclaim responsibility. This paper argues that these contradictory strategies are still being employed in contemporary criminal justice, although the focus and the purpose have now shifted. The focus is upon the ‘vulnerable’ suspect, whose social identity is as incongruous, complex and contradictory as his social environment, and the purpose is to redirect attention away from negative state practices, whilst simultaneously displaying a compassionate and benevolent countenance in order to appeal to the voting public. The findings presented here result from intensive qualitative research with police officers, with health care professionals, and with civilian volunteers who work within police custodial environments. The data has been gathered over a three-year period and includes observational and interview data which has been thematically analysed to expose the underpinning mechanisms from which the properties of the system emerge. What is revealed is evidence of contemporary state practices of denial relating to the harms of austerity and the structural relations of vulnerability, whilst simultaneously adapting through processes of ‘othering’ of the vulnerable, ‘responsibilisation’ of citizens, defining deviance down through diversionary practices, and managing success through redefining the aims of the system. The ‘vulnerable’ suspect is subject to individual pathologising, and yet the nature of risk is aggregated. ‘Vulnerable’ suspects are supported in police custody by private citizens, by multi-agency partnerships, and by for-profit organisations, while the state seeks to collate and control services, and thereby to retain a veneer of control. Late modern ambivalence to crime control and the associated contradictory practices of abjuration and adjustment have extended to state responses to vulnerable suspects. The support available in the custody environment operates to control and minimise operational and procedural risk, rather than for the welfare of the detained person, and in fact, the support available is discovered to be detrimental to the very people that it claims to benefit. The ‘vulnerable’ suspect is now subject to the bifurcated logics employed at the new limits of the sovereign state.

Keywords: custody, policing, sovereign state, vulnerability

Procedia PDF Downloads 158
8306 Housing Delivery in Nigeria’s Urban Areas: The Plight of the Poor in Owerri, Capital of Imo State, Nigeria

Authors: Joachim Onyike

Abstract:

The Federal Government of Nigeria in 2012 came up with a new National Housing Policy; one of its major objectives was to make housing affordable to the poor. Six years down the line, this study was carried out to find out whether the poor have fared better under the new housing policy. Owerri, the capital of Imo State, was adopted as a case study to mirror the situation nationwide. The study population was made up of low-income civil servants, i.e., grade levels 1–6 in the Imo State Civil Service. The study looked at household size, household income, rental levels, house prices, costs of major building materials, land values, land tenure, the interest rate on mortgages, inflation rate, and the status of government interventions, owing to their obvious effect on housing affordability by the low-income earners. The study made use of physical observations, questionnaires, and interviews as well as library studies to elicit relevant information. Housing affordability by the subject population did not improve. It rather dropped. The study came to the conclusion that in spite of the new National Housing Policy, housing affordability by the low-income earners has not improved. The policy as it affects the poor has not been duly implemented by both Federal and State Governments.

Keywords: house prices, housing affordability, housing policy, land values, low-income earners

Procedia PDF Downloads 186
8305 A Critical Review of Mechanization in Rice Farming in Indonesia

Authors: K. Suheiti, P. Soni, Yardha

Abstract:

Challenges ahead of Indonesian agricultural development include increasing rural welfare, food needs, and the provision of employment through resource optimization that are laid out in agribusiness system. The agricultural system also responsive to the changing strategic environment. However, mounting pressure of population increase and changes in land-uses, require intensive use of agricultural land with modern agricultural machinery. Similarly, environmentally friendly technologies should continue to be developed in an effort to build and develop a good farming practice model. This paper explains the development of agricultural mechanization in Indonesia, particularly on rice production. The method of the research was analyze secondary data, tabulation and interpretation. The result showed, there was a variety of tools and agricultural machinery that have been produced and used by farmers to support national food security. The role of mechanization was needed to support national rice production and food security achievement.

Keywords: farming, Indonesia, mechanization, rice

Procedia PDF Downloads 485
8304 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt

Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri

Abstract:

Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.

Keywords: Alexandria, density, mixed use, transportation, vibrancy

Procedia PDF Downloads 276