Search results for: income security
3005 Film Dosimetry – An Asset for Collaboration Between Cancer Radiotherapy Centers at Established Institutions and Those Located in Low- and Middle-Income Countries
Authors: A. Fomujong, P. Mobit, A. Ndlovu, R. Teboh
Abstract:
Purpose: Film’s unique qualities, such as tissue equivalence, high spatial resolution, near energy independence and comparatively less expensive dosimeter, ought to make it the preferred and widely used in radiotherapy centers in low and middle income countries (LMICs). This, however, is not always the case, as other factors that are often maybe taken for granted in advanced radiotherapy centers remain a challenge in LMICs. We explored the unique qualities of film dosimetry that can make it possible for one Institution to benefit from another’s protocols via collaboration. Methods: For simplicity, two Institutions were considered in this work. We used a single batch of films (EBT-XD) and established a calibration protocol, including scan protocols and calibration curves, using the radiotherapy delivery system at Institution A. We then proceeded and performed patient-specific QA for patients treated on system A (PSQA-A-A). Films from the same batch were then sent to a remote center for PSQA on radiotherapy delivery system B. Irradiations were done at Institution B and then returned to Institution A for processing and analysis (PSQA-B-A). The following points were taken into consideration throughout the process (a) A reference film was irradiated to a known dose on the same system irradiating the PSQA film. (b) For calibration, we utilized the one-scan protocol and maintained the same scan orientation of the calibration, PSQA and reference films. Results: Gamma index analysis using a dose threshold of 10% and 3%/2mm criteria showed a gamma passing rate of 99.8% and 100% for the PSQA-A-A and PSQA-B-A, respectively. Conclusion: This work demonstrates that one could use established film dosimetry protocols in one Institution, e.g., an advanced radiotherapy center and apply similar accuracies to irradiations performed at another institution, e.g., a center located in LMIC, which thus encourages collaboration between the two for worldwide patient benefits.Keywords: collaboration, film dosimetry, LMIC, radiotherapy, calibration
Procedia PDF Downloads 753004 Molecular Approach for the Detection of Lactic Acid Bacteria in the Kenyan Spontaneously Fermented Milk, Mursik
Authors: John Masani Nduko, Joseph Wafula Matofari
Abstract:
Many spontaneously fermented milk products are produced in Kenya, where they are integral to the human diet and play a central role in enhancing food security and income generation via small-scale enterprises. Fermentation enhances product properties such as taste, aroma, shelf-life, safety, texture, and nutritional value. Some of these products have demonstrated therapeutic and probiotic effects although recent reports have linked some to death, biotoxin infections, and esophageal cancer. These products are mostly processed from poor quality raw materials under unhygienic conditions resulting to inconsistent product quality and limited shelf-lives. Though very popular, research on their processing technologies is low, and none of the products has been produced under controlled conditions using starter cultures. To modernize the processing technologies for these products, our study aims at describing the microbiology and biochemistry of a representative Kenyan spontaneously fermented milk product, Mursik using modern biotechnology (DNA sequencing) and their chemical composition. Moreover, co-creation processes reflecting stakeholders’ experiences on traditional fermented milk production technologies and utilization, ideals and senses of value, which will allow the generation of products based on common ground for rapid progress will be discussed. Knowledge of the value of clean starting raw material will be emphasized, the need for the definition of fermentation parameters highlighted, and standard equipment employment to attain controlled fermentation discussed. This presentation will review the available information regarding traditional fermented milk (Mursik) and highlight our current research work on the application of molecular approaches (metagenomics) for the valorization of Mursik production process through starter culture/ probiotic strains isolation and identification, and quality and safety aspects of the product. The importance of the research and future research areas on the same subject will also be highlighted.Keywords: lactic acid bacteria, high throughput biotechnology, spontaneous fermentation, Mursik
Procedia PDF Downloads 2933003 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 4903002 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis
Authors: Diego Caballero Vélez
Abstract:
In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.Keywords: cooperation, migration crisis, national responses, threat perception
Procedia PDF Downloads 2393001 Factors Affecting Online Health Seeking Behaviors in Middle-Income Class Filipino Adults
Authors: Reinzo Vittorio B. Cardenas, Heather Venice L. Abogado, Andrea Therese V. Afable, Rhea D. Avillanoza, Marie Abegail P. Ayagan, Catherine D. Bantayan
Abstract:
As the Internet provides fast and reliable health-related information, the tendency to self-diagnose increases to further understand medical jargon in a diagnosis with a physician and decreases costly consultation fees. The study aimed to explore and understand the factors affecting online health-seeking behaviors in middle-income class adults in Metro Manila. The study was conducted from March to April of 2021 with a sample size of 200 individuals aged 20 to 49 years old. The study was delivered via an online survey that used a questionnaire adapted from the research of Lee et al. (2015). Specifically, the survey consisted of three sections: assessing web-based health-seeking behaviors, consultation with health professionals, and participants' hesitancy to consult with physicians, which used a mix of a 5-point Likert-type scale with multiple responses and multiple-choice options. The results showed that the age and educational attainment of the respondents had a negative effect while presenting a positive effect of socio-economic status on health-seeking behavior. Lastly, there was a significant effect of participant’s hesitancy for professional consultation on their health-seeking behavior. The results gleaned from the study indicated that various individual and socio-economic factors might significantly affect one’s health-seeking behaviors. Although hesitancy had a significant effect on the spectrum of health-seeking behaviors, this does not imply that certain factors are specifically related to an individual’s tendency to seek health information. This information instead becomes essential in understanding the patient-physician relationship and giving patients a more holistic treatment.Keywords: health-seeking behavior, health information, Internet, physician consultation
Procedia PDF Downloads 2163000 Community Perceptions on Honey Quality in Tobacco Growing Areas in Kigoma Region, Tanzania
Authors: Pilly Kagosi, Cherestino Balama
Abstract:
Beekeeping plays major role in improving biodiversity, increasing household income, and crop production through pollination. Tobacco farming is also the main source of household income for smallholder farmers. In Kigoma, production of Tobacco has increased and is perceived to threaten honey quality. The study explored the perception of the community on quality of honey in tobacco and non tobacco growing areas. The study was conducted in Kigoma Region, Tanzania. District and Villages were purposively sampled based on large numbers of people dealing with beekeeping activities and tobacco farming. Socioeconomic data were collected and analysed using Statistical Package for Social Sciences and content analysis. The perception of stakeholders on honey quality was analysed using Likert scale. Majority of the respondents agreed that tobacco farming greatly affects honey quality because honey from beehives near tobacco farms test bitter and sometimes irritating, which was associated with nicotine content and agrochemicals applied to tobacco crops. Though they cannot differentiate honey bitterness from agrochemicals and bee fodders. Furthermore, it was revealed that chemicals applied to tobacco and vegetables have negative effect on the bees and honey quality. Respondents believe that setting bee hives near tobacco farms might contaminate honey and therefore affect its quality. Beekeepers are not aware of the nicotine content from other bee fodders like miombo of which do not have any effect on human beings. Actually, tobacco farming does not affect beekeeping activities in issue of quality when farmers follow proper management of tobacco flowers and proper handling of honey. Though, big challenge in tobacco farming is chemically applied to the crops and harvest bee fodders for curing tobacco. The study recommends training to community on proper management of tobacco and proper handling of bee products.Keywords: community, honey, perceptions, tobacco
Procedia PDF Downloads 1442999 Financial Liberalization, Exchange Rates and Demand for Money in Developing Economies: The Case of Nigeria, Ghana and Gambia
Authors: John Adebayo Oloyhede
Abstract:
This paper examines effect of financial liberalization on the stability of the demand for money function and its implication for exchange rate behaviour of three African countries. As the demand for money function is regarded as one of the two main building blocks of most exchange rate determination models, the other being purchasing power parity, its stability is required for the monetary models of exchange rate determination to hold. To what extent has the liberalisation policy of these countries, for instance liberalised interest rate, affected the demand for money function and what has been the consequence on the validity and relevance of floating exchange rate models? The study adopts the Autoregressive Instrumental Package (AIV) of multiple regression technique and followed the Almon Polynomial procedure with zero-end constraint. Data for the period 1986 to 2011 were drawn from three developing countries of Africa, namely: Gambia, Ghana and Nigeria, which did not only start the liberalization and floating system almost at the same period but share similar and diverse economic and financial structures. Its findings show that the demand for money was a stable function of income and interest rate at home and abroad. Other factors such as exchange rate and foreign interest rate exerted some significant effect on domestic money demand. The short-run and long-run elasticity with respect to income, interest rates, expected inflation rate and exchange rate expectation are not greater than zero. This evidence conforms to some extent to the expected behaviour of the domestic money function and underscores its ability to serve as good building block or assumption of the monetary model of exchange rate determination. This will, therefore, assist appropriate monetary authorities in the design and implementation of further financial liberalization policy packages in developing countries.Keywords: financial liberalisation, exchange rates, demand for money, developing economies
Procedia PDF Downloads 3722998 Health Promoting Behaviors among Thai Older Adults: Trend and Association with Health Status
Authors: Alongkorn Pekalee, Rossarin Gray
Abstract:
Various determinants associated with older health include socio-demographic factors and health-promoting behaviors but lack in scholars recommended what factors associated with health status in specific sub-groups of older adults. The current study aims to explore the health-promoting behaviors and to examine and compare the associations of these factors with self-rated health status among three older age cohorts in Thai traditional context. Methods: This study is based on the Survey of Older Persons in Thailand (SOPT), in 2017, conducted by the National Statistical Office (NSO) of Thailand. Participants were classified into three groups by using the Thai contextual recommendation: youngest-old cohort (60-69), old-old cohort (70-79) and oldest old cohort (80 or older). Health promoting behaviors are the behaviors which associated with the health status of older adults include alcohol consumption, smoking, diet, and physical activity. Health status was defined as a subjective measurement by using self-rated health, a simple measure of general health. The socio-demographic factors, health-promoting behaviors, and health status were explained and summarized by descriptive statistics. The binary logistic regression was performed to analyze the data and evaluate the associations between independent and dependent variables. Results: Increase of age contributes to a higher proportion of health-promoting behaviors. All variables were associated with self-reported health status as good health among three older age cohorts statistically significant (p-value = 0.000). However, the influence of income sufficiency on health status is more notable, especially in older adults who aged 60-69 and 70-79. The influence of dietary and physical activity on health status became greater as age increased. Conclusion: the results suggest that income sufficiency should be noted in a plan to promote healthy aging, and co-residence should be more concerned especially in the oldest old cohort. Moreover, the interventions or policies to promote older health behaviors like diet and physical activity should be emphasized in the oldest old cohort more than others.Keywords: health-promoting behaviors, older adults, self- rated health, Thailand
Procedia PDF Downloads 1382997 Fruits and Vegetable Consumers' Behaviour towards Organised Retailers: Evidence from India
Authors: K. B. Ramappa, A. V. Manjunatha
Abstract:
Consumerism in India is witnessing unprecedented growth driven by favourable demographics, rising young and working population, rising income levels, urbanization and growing brand orientation. In addition, the increasing level of awareness on health, hygiene and quality has made the consumers to think on the fairly traded goods and brands. This has made retailing extremely important to everyone because without retailers’ consumers would not have access to day-to-day products. The increased competition among different retailers has contributed significantly towards rising consumer awareness on quality products and brand loyalty. Many existing empirical studies have mainly focused on net saving of consumers at organised retail via-a-vis unorganised retail shops. In this article, authors have analysed the Bangalore consumers' attitudes towards buying of fruits and vegetables and their choice of retail outlets. The primary data was collected from 100 consumers belonging to the Bangalore City during October 2014. Sample consumers buying at supermarkets, convenience stores and hypermarkets were purposively selected. The collected data was analyzed using descriptive statistics and multinomial logit model. It was found that among all variables, quality and prices were major accountable factors for buying fruits and vegetables at organized retail shops. The empirical result of multinomial logit model reveals that annual net income was positively associated with the Big Bazar and Food World consumers and negatively associated with the Reliance Fresh, More and Niligiris consumers, as compared with the HOPCOMS consumers. Per month expenditure on fruits and vegetables was positively and age of the consumer was negatively related to the consumers’ choice of buying at modern retail markets. Consumers were willing to buy at modern retail outlets irrespective of the distance.Keywords: organized retailers, consumers' attitude, consumers' preference, fruits, vegetables, multinomial logit, Bangalore
Procedia PDF Downloads 4132996 Conservation and Restoration of Biodiversity in Khagrachari
Authors: Anima Ashraf
Abstract:
Over the past few decades biodiversity has become the issue of global concern for its rapid reduction worldwide. Bangladesh is no exception. The country is exceptionally endowed with a vast variety of flora and fauna, but due to tremendous population pressure, rural poverty and unemployment it has been decreased alarmingly. Since, both biodiversity and sustainable development are the part of human life in modern era and both work together to make our life safer and comfortable therefore balance should be kept in development and biodiversity conservation and priority should be given to alternative and sustainable development paths. This paper is based on study of two projects undertaken by Arannayk Foundation jointly with its local NGO partners. The aim was to understand previous, current and future scenarios for the hilly biodiversity of Khagrachari in the Chittagong Hill Tracts (CHT) of Bangladesh. It is also observed how alternative income generating activities (AIGA) improve livelihood of the tribal inhabitants of the area, decrease their dependency on forest resources and also aid conservation activities. Intensive field visits were made and interviews were conducted with key informants to see the progress and achievements of local NGOs working with the tribal community for the past seven years to restore the denuded hills of Khagrachari. The paper also covers the impacts and interventions of the projects and the methods used to aid conservation activities. Raising awareness among the villagers has reduced extraction of forests resources by 47% and granting funds and access to microcredit to adopt AIGAs have increased their average annual income by 25%. Finally, the paper concludes that effective community-based conservation practices are fundamental to ensure biodiversity conservation in the Chittagong Hill Tracts. In order to conserve biodiversity and restore the forests of CHT, livelihood development of the villagers has to be considered as the main component of the projects undertaken by all NGOs and the Government.Keywords: biodiversity, conservation, forests, livelihood
Procedia PDF Downloads 2752995 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork
Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting
Abstract:
This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark
Procedia PDF Downloads 2682994 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2412993 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security
Authors: Lynndee Kemmet
Abstract:
The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.Keywords: food security, food system model, political stability, US Military
Procedia PDF Downloads 1952992 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 2752991 Variation in Total Iron and Zinc Concentration, Protein Quality, and Quantity of Maize Hybrids Grown under Abiotic Stress and Optimal Conditions
Authors: Tesfaye Walle Mekonnen
Abstract:
Maize is one of the most important staple food crops for most low-income households in the Sub-Saharan (SSA). Combined heat and drought stress is the major production threats that reduce the yield potential of biofortified maize and restrain various macro and micronutrient deficiencies highly prevalent in low-income people who rely solely on maize-based diets, SSA. This problem can be alleviated by crossing the biofortified inbred lines with different nutritional attributes, Fe, Zn, Protein, and Provitamin A, and developing agronomically superior and stable multi-nutrient maize of various genetic backgrounds. This aimed to understand the correlation between biofortified inbred lines per se and hybrid performance under combined heat and drought stress conditions (CSC). The experiment was conducted at CIMMYT, Zimbabwe, using α-lattice design with three replications. The hybrid effect was highly significant for zein fractions (α-, β-, γ- and δ-zein) zinc, (Zn), and iron (Fe) provitamin A, phytic acid, and grain yield. Under CSC, Fe, Zn concentration, provitamin A in grain and grain yield of hybrids were significantly decreased, however, the zein fraction content and phytic acid content increases in grain were increased under CSC. The phenotypic correlation between grain yield with Zn, Fe concentration, and Provitamin A in grain was strongly positive and higher under CSC than in well-watered conditions. The present investigation confirmed that under CSC, Fe, and Zn-enhanced hybrids could be forecasted to a certain scope based on the performance of and scientifically selected for desirable grain yield and related traits with CSC tolerance during hybrid development programs. In conclusion, the development of high-yielding and micronutrient-dense maize variety is possible under CSC, which could reduce the highly prevalent micronutrient in SSA.Keywords: drought, Fe, heat, maize, protein, zein fractions, Zn
Procedia PDF Downloads 662990 Bridge Healthcare Access Gap with Artifical Intelligence
Authors: Moshmi Sangavarapu
Abstract:
The US healthcare industry has undergone tremendous digital transformation in recent years, but critical care access to lower-income ethnicities is still in its nascency. This population has historically showcased substantial hesitation to seek any medical assistance. While the lack of sufficient financial resources plays a critical role, the existing cultural and knowledge barriers also contribute significantly to widening the access gap. It is imperative to break these barriers to ensure timely access to therapeutic procedures that can save important lives! Based on ongoing research, healthcare access barriers can be best addressed by tapping the untapped potential of caregiver communities first. They play a critical role in patients’ diagnoses, building healthcare knowledge and instilling confidence in required therapeutic procedures. Recent technological advancements have opened many avenues by developing smart ways of reaching the large caregiver community. A digitized go-to-market strategy featuring connected media coupled with smart IoT devices and geo-location targeting can be collectively leveraged to reach this key audience group. AI/ML algorithms can be thoroughly trained to identify relevant data signals from users' location and browsing behavior and determine useful marketing touchpoints. The web behavior can be further assimilated with natural language processing to identify contextually relevant interest topics and decipher potential caregivers on digital avenues to serve that brand message. In conclusion, grasping the true health access journey of any lower-income ethnic group is important to design beneficial touchpoints that can alleviate patients’ concerns and allow them to break their own access barriers and opt for timely and quality healthcare.Keywords: healthcare access, market access, diversity barriers, patient journey
Procedia PDF Downloads 542989 Geothermal Resources to Ensure Energy Security During Climate Change
Authors: Debasmita Misra, Arthur Nash
Abstract:
Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.Keywords: exploration, geothermal, renewable energy, sustainable
Procedia PDF Downloads 1542988 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda
Authors: Sofia Sutera
Abstract:
Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda
Procedia PDF Downloads 1352987 Geo-Visualization of Crimes against Children: An India Level Study 2001-2012
Authors: Ritvik Chauhan, Vijay Kumar Baraik
Abstract:
Crime is a rare event on earth surface. It is not simple but a complex event occurring in a spatio- temporal environment. Crime is one of the most serious security threats to human environments as it may result in harm to the individuals through the loss of property, physical and psychological injuries. The conventional studies done on different nature crime was mostly related to laws, psychological, social and political themes. The geographical areas are heterogeneous in their environmental conditions, associations between structural conditions, social organization which contributing specific crimes. The crime pattern analysis is made through theories in which criminal events occurs in persistent, identifiable patterns in a particular space and time. It will be the combined analysis of spatial factors and rational factors to the crime. In this study, we are analyzing the combined factors for the origin of crime against children. Children have always been vulnerable to victimization more because they are silent victims both physically and mentally to crimes and they even not realize what is happening with them. Their trusting nature and innocence always misused by criminals to perform crimes. The nature of crime against children is changed in past years like child rape, kidnapping &abduction, selling & buying of girls, foeticide, infanticide, prostitution, child marriage etc turned to more cruel and inhuman. This study will focus on understanding the space-time pattern of crime against children during the period 2001-2012. It also makes an attempt to explore and ascertain the association of crimes categorised against children, its rates with various geographical and socio-demographic factors through causal analysis using selected indicators (child sex-ratio, education, literacy rate, employment, income, etc.) obtained from the Census of India and other government sources. The outcome of study will help identifying the high crime regions with specified nature of crimes. It will also review the existing efforts and exploring the new plausible measure for tracking, monitoring and minimization of crime rate to meet the end goal of protecting the children from crimes committed against them.Keywords: crime against children, geographic profiling, spatio-temporal analysis, hotspot
Procedia PDF Downloads 2112986 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions
Authors: Abdulrahman Yarali, Machica McClain
Abstract:
In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare
Procedia PDF Downloads 212985 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 1062984 Cloud Monitoring and Performance Optimization Ensuring High Availability
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy
Procedia PDF Downloads 602983 Credit Cooperatives: A Factor for Improving the Sustainable Management of Private Forests
Authors: Todor Nickolov Stoyanov
Abstract:
Cooperatives are present in all countries and in almost all sectors, including agriculture, forestry, food, finance, health, marketing, insurance and credit. Strong cooperatives are able to overcome many of the difficulties faced by private owners. Cooperatives use seven principles, including the 'Community Concern" principle, which enables cooperatives to work for the sustainable development of the community. The members of cooperatives may use different systems for generating year-round employment and for receiving sustainable income through performing different forestry activities. Various methods are used during the preparation of the report. These include literature reviews, statistics, secondary data and expert interviews. The members of the cooperatives are benefits exclusively from increasing the efficiency of the various products and from the overall yield of the harvest, and ultimately from achieving better profit through cooperative efforts. Cooperatives also use other types of activities that are an additional opportunity for cooperative income. There are many heterogeneous activities in the production and service sectors of the forest cooperatives under consideration. Some cooperatives serve dairies, distilleries, woodworking enterprises, tourist homes, hotels and motels, shops, ski slopes, sheep breeding, etc. Through the revenue generated by the activity, cooperatives have the opportunity to carry out various environmental and protective activities - recreation, water protection, protection of endangered and endemic species, etc., which in the case of small-scale forests cannot be achieved and the management is not sustainable. The conclusions indicate the results received in the analysis. Cooperative management of forests and forest lands gives higher incomes to individual owners. The management of forests and forest lands through cooperatives helps to carry out different environmental and protective activities. Cooperative forest management provides additional means of subsistence to the owners of poor forest lands. Cooperative management of forests and forest lands support owners to implement the forest management plans and to apply sustainable management of these territories.Keywords: cooperative, forestry, forest owners, principles of cooperation
Procedia PDF Downloads 2442982 A Comparison of Methods for Neural Network Aggregation
Authors: John Pomerat, Aviv Segev
Abstract:
Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning
Procedia PDF Downloads 1622981 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda
Authors: Seember Susan Aondoakura
Abstract:
This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.Keywords: conflict, protection, security, SGBV
Procedia PDF Downloads 962980 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System
Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi
Abstract:
The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA
Procedia PDF Downloads 1162979 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network
Authors: Abdulaziz Alsadhan, Naveed Khan
Abstract:
In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)
Procedia PDF Downloads 3672978 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security
Authors: Abel Edeowede Abhulimen
Abstract:
Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.Keywords: performance, power industry, industrialization, security, energy
Procedia PDF Downloads 722977 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE
Authors: Emad Bataineh, Sara Al-Mutawa
Abstract:
The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.Keywords: e-government portal, e-service, usability, TAM model
Procedia PDF Downloads 4302976 Sericulture a Way for Bio-Diversity Conservation, Employment Generation and Socio-Economic Change: A-Comparison of Two Tribal Block of Raigarh, India
Authors: S. K. Dewangan, K. R. Sahu, S. Soni
Abstract:
Unemployment is today’s basic socio-economic problem eroding national income and living standards, aggravating national development and poverty alleviation. The farmers are encouraged to take up non-agriculture practices which are integrated with Sericulture. Sericulture is one of the primary occupations for livelihood of poor people in tribal area. Most of tribal are involved in Sericulture. Tasar, Eri are the main forest-based cultivation. Among these sericultures is the major crop adopted by the Tribal’s and practiced in respective areas. Out of the 6, 38,588 villages in India, sericultures are practiced in about 69000 villages providing employment to about 7.85 million people. Sericulture is providing livelihood for 9, 47,631 families. India continues to be the second largest producer of silk in the World. Among the four varieties of silk produced, as in 2012-13, Mulberry accounts for 18,715 MT, Eri 3116 MT, Tasar 1729 MT and Muga 119MT of the total raw silk production in the country. Sericulture with its unique features plays an important role in upgrading the socio-economic conditions of the rural folk and with employment opportunities to the educated rural youth and women. In view of the importance of sericulture enterprise for the biodiversity conservation as well as its cultural bondage, the paper tries to enlighten and discuss the significance of sericulture and strategies to be taken for the employment generation in Indian sericulture industry. The present paper explores the possible employment opportunities derived from problem analysis and strategies to be adopted aiming at revolutionary biodiversity conservation in the study area. The paper highlights the sericulture is a way for biodiversity conservation, employment generation in Raigarh district, their utilization and needs as they act as a tool for socio-economic change for tribal. The study concludes with some suggestions to improve the feasibility of sericulture in long term.Keywords: bio-diversity, employment, sericulture, tribal, income, socio-economic
Procedia PDF Downloads 365