Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6006

Search results for: security service

4626 Pre-Service EFL Teachers' Perceptions of Written Corrective Feedback in a Wiki-Based Environment

Authors: Mabel Ortiz, Claudio Díaz

Abstract:

This paper explores Chilean pre-service teachers' perceptions about the provision of corrective feedback in a wiki environment during the collaborative writing of an argumentative essay. After conducting a semi-structured interview on 22 participants, the data were processed through the content analysis technique. The results show that students have positive perceptions about corrective feedback, provided through a wiki virtual environment, which in turn facilitates feedback provision and impacts language learning effectively. Some of the positive perceptions about virtual feedback refer to permanent access, efficiency, simultaneous revision and immediacy. It would then be advisable to integrate wiki-based feedback as a methodology for the language classroom and collaborative writing tasks.

Keywords: argumentative essay, focused corrective feedback, perception, wiki environment

Procedia PDF Downloads 269
4625 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges

Authors: Murtala Gada Abubakar, Aliyu T. Umar

Abstract:

A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.

Keywords: basement complex, hydrological processes, Sokoto Basin, water security

Procedia PDF Downloads 300
4624 A Review of Ultralightweight Mutual Authentication Protocols

Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran

Abstract:

Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.

Keywords: RFID, Ultralightweight, UMAP, SASI

Procedia PDF Downloads 130
4623 The Impact of Land Use Ex-Concession to the Environment in Dharmasraya District, West Sumatra Province, Indonesia

Authors: Yurike, Yonariza, Rudi Febriamansyah, Syafruddin Karimi

Abstract:

Forest is a natural resource that has an important function as a supporting element of human life. Forest degradation enormous impact on global warming is a reality we have experienced together, that disruption of ecosystems, extreme weather conditions, disruption of water management system watersheds and the threat of natural disasters as floods, landslides and droughts, even disruption food security. Dharmasraya is a district in the province of West Sumatra, which has an area of 92.150 ha of forest, which is largely a former production forest concessions (Forest Management Rights) which is supposed to be a secondary forest. This study answers about the impact of land use in the former concession area Dharmasraya on the environment. The methodology used is the household survey, key informants, and satellite data / GIS. From the results of the study, the former concession area in Dharmasraya experienced a reduction of forest cover over time significantly. Forest concessions should be secondary forests in Dharmasraya, now turned conversion to oil palm plantations. Population pressures and growing economic pressures, resulting in more intensive harvesting. As a result of these forest disturbances caused changes in forest functions. These changes put more emphasis towards economic function by ignoring social functions or ecological function. Society prefers to maximize their benefits today and pay less attention to the protection of natural resources. This causes global warming is increasing and this is not only felt by people around Dharmasraya but also the world. Land clearing by the community through a process in slash and burn. This fire was observed by NOAA satellites and recorded by the Forest Service of West Sumatra. This demonstrates the ability of trees felled trees to absorb carbon dioxide (CO2) to be lost, even with forest fires accounted for carbon dioxide emitted into the air, and this has an impact on global warming. In addition to the change of control of land into oil palm plantations water service has been poor, people began to trouble the water and oil palm plantations are located in the watershed caused the river dried up. Through the findings of this study is expected to contribute ideas to the policy makers to pay more attention to the former concession forest management as the prevention or reduction of global warming.

Keywords: climate change, community, concession forests, environment

Procedia PDF Downloads 312
4622 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 84
4621 Price Promotions and Inventory Decisions

Authors: George Hadjinicola, Andreas Soteriou

Abstract:

This paper examines the relationship between the number of price promotions that a firm should conduct per year and the level of safety stocks that the firm should maintain. Price promotions result in temporary sales increases, which affect the operations function through (1) an increase in the quantities demanded and (2) an increase in safety stocks required to maintain the desired service level. We propose a modeling framework where both price promotions and improved service levels, operationalized through higher safety stocks, can affect sales. We treat the annual number of promotions as a decision variable. We identify market conditions where the operations function, through improved safety stocks, can complement price promotions or even play the leading role in sales increases.

Keywords: price promotions, safety stocks, marketing/operations interface, mathematical model

Procedia PDF Downloads 70
4620 Phase Composition Analysis of Ternary Alloy Materials for Gas Turbine Applications

Authors: Mayandi Ramanathan

Abstract:

Gas turbine blades see the most aggressive thermal stress conditions within the engine, due to high Turbine Entry Temperatures in the range of 1500 to 1600°C. The blades rotate at very high rotation rates and remove a significant amount of thermal power from the gas stream. At high temperatures, the major component failure mechanism is a creep. During its service over time under high thermal loads, the blade will deform, lengthen and rupture. High strength and stiffness in the longitudinal direction up to elevated service temperatures are certainly the most needed properties of turbine blades and gas turbine components. The proposed advanced Ti alloy material needs a process that provides a strategic orientation of metallic ordering, uniformity in composition and high metallic strength. The chemical composition of the proposed Ti alloy material (25% Ta/(Al+Ta) ratio), unlike Ti-47Al-2Cr-2Nb, has less excess Al that could limit the service life of turbine blades. Properties and performance of Ti-47Al-2Cr-2Nb and Ti-6Al-4V materials will be compared with that of the proposed Ti alloy material to generalize the performance metrics of various gas turbine components. This paper will involve the summary of the effects of additive manufacturing and heat treatment process conditions on the changes in the phase composition, grain structure, lattice structure of the material, tensile strength, creep strain rate, thermal expansion coefficient and fracture toughness at different temperatures. Based on these results, additive manufacturing and heat treatment process conditions will be optimized to fabricate turbine blade with Ti-43Al matrix alloyed with an optimized amount of refractory Ta metal. Improvement in service temperature of the turbine blades and corrosion resistance dependence on the coercivity of the alloy material will be reported. A correlation of phase composition and creep strain rate will also be discussed.

Keywords: high temperature materials, aerospace, specific strength, creep strain, phase composition

Procedia PDF Downloads 90
4619 Promoting Community Food Security and Empowerment among Somali Bantu Refugees: A Case for Community Kitchen Gardens

Authors: Michelle D. Hand, Michelle L. Kaiser

Abstract:

African refugees are among the fastest-growing populations in the United States and nearly half of these refugees come from Somalia, many of whom are Somali Bantus, the most marginalized group in Somali society. Yet limited research is available on Somali Bantu refugees. In this paper, Empowerment Theory is used to guide an in-depth exploration of the potential benefits of using community kitchen gardens to increase community food security among Somali Bantu refugees. In addition, recommendations for future research, policy and practice are offered following existing scholarly and grey source literature guidelines as informed by an Empowerment perspective to best meet the needs of this under-researched and underserved yet growing population.

Keywords: community kitchen gardens, food insecurity, refugees, Somali Bantu

Procedia PDF Downloads 255
4618 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment

Authors: Atma Sahu

Abstract:

After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.

Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems

Procedia PDF Downloads 65
4617 Post Covid-19 Scenario and Contemporary International Security Challenges

Authors: Rubina Waseem

Abstract:

The research focuses on the major crises and major effects, largely unforeseen, to counter international security concerns. At the close of 2019, the Covid-19 pandemic broke out in the city of Wuhan in Hubei province, China. The coronavirus was initially seen as an inchoate danger, aimed at striking people randomly. Owing to the extraordinary transmissibility of the virus and the highly knitted nature of the international political world, the Covid-19 soon became a formidable global challenge. The once hustling and bustling avenues, city centers, and market places became deserted. Lockdown, self-isolation, hygiene and safety, social-distancing, and job losses became a new norm. The national economies gradually plunged into crisis. The pandemic has so far caused over 33 million cases and one million deaths. The virus continues to devastate social life, as there is yet no therapeutic available. While the world was preoccupied addressing the human and social toll, the pandemic has exacerbated despair, mistrust, and friction in international relations, diplomacy, and strategy. The research will discuss how the coronavirus has accelerated the trends of transition in the postwar security order constructed by the United States. China, Russia, European Union, and other lesser regional players are now increasingly changing their security orientations to undermine the United States standing and authority in world politics. The systemic level analyses will be adopted as a methodology to broaden the lens of the study, and the research will analyze the prevalent global power distribution, whether vulnerable or exposed. The trends of parochial nationalism and isolationism are increasingly replacing multilateralism and collectivism. Yet worse, military posturing is assuming a greater role in international interactions. Taken together, the pandemic has worsened the prospects of international peace and stability by mounting equal pressure across the channels of international relations, diplomacy, and strategy. It is yet unclear which country or collectivity will face the real brunt. Despite this jaded and pessimistic view, the lingering pandemic has the potential to reinforce cooperation, multilateralism, and collectivism in the realm of international politics. There is a renewed momentum for global efforts against the pandemic. States and societies are coming closer to act as a whole. Equally important, the world leaders are feeling tempted to revisit the traditional conception of national security. In this regard, they are exploring the possibility of according preference to non-traditional security issues. In essence, the research concludes that Covid-19 has put the international political system under a great trial.

Keywords: covid-19, global challenges, international politics, international security

Procedia PDF Downloads 152
4616 Revolutionizing Higher Education: AI-Powered Gamification for Enhanced Learning

Authors: Gina L. Solano

Abstract:

This project endeavors to enhance learning experiences for undergraduate pre-service teachers and graduate K-12 educators by leveraging artificial intelligence (AI). Firstly, the initiative delves into integrating AI within undergraduate education courses, fostering traditional literacy skills essential for academic success and extending their applicability beyond the classroom. Education students will explore AI tools to design literacy-focused activities aligned with their curriculum. Secondly, the project investigates the utilization of AI to craft instructional materials employing gamification strategies (e.g., digital and classic games, badges, quests) to amplify student engagement and motivation in mastering course content. Lastly, it aims to create a professional repertoire that can be applied by pre-service and current teachers in P-12 classrooms, promoting seamless integration for those already in teaching positions. The project's impact extends to benefiting college students, including pre-service and graduate teachers, as they enhance literacy and digital skills through AI. It also benefits current P-12 educators who can integrate AI into their classrooms, fostering innovative teaching practices. Moreover, the project contributes to faculty development, allowing them to cultivate low-risk and engaging classroom environments, ultimately enriching the learning journey. The insights gained from this project can be shared within and beyond the discipline to advance the broader field of study.

Keywords: artificial intelligence, gamification, learning experiences, literacy skills, engagement

Procedia PDF Downloads 33
4615 Factors Affecting the Uptake of Modern Contraception Services in Oyo State, Nigeria

Authors: Folajinmi Oluwasina, Magbagbeola Dairo, Ikeoluwapo Ajayi

Abstract:

Contraception has proven to be an effective way of controlling fertility and spacing births. Studies have shown that contraception can avert the high-risk pregnancies and consequently reduce maternal deaths up to 32%. Uptake of modern contraception is promoted as a mechanism to address the reproductive health needs of men and women, as well as the crucial challenge of rapid population increase. A cross- sectional descriptive study using a two- stage systematic sampling technique was used to select 530 women of reproductive age out of 20,000 households. Respondents were interviewed using a semi-structured questionnaire. Knowledge was assessed on a 5 point score in which a score of ≤ 2 rated poor while perception was scored on 36 points score in which a score of ≤ 18 was rated low. Data were analyzed using descriptive statistics, Chi-square test and logistic regression at p< 0.05. There were 530 respondents. Age of respondents was 30.3 ±7.8 years, and 73.0% were married. About 90% had good knowledge of contraception while 60.8% had used contraceptives. The commonest source of information about contraception was mass media (72.8%). Minority (26.1%) obtained husbands approval before using contraceptive while 20.0% had used modern contraceptives before the first birth. Many (54.5%) of the respondents agreed that contraception helps in improving standard of living and 64.7% had good perception about contraception. Factors that hindered effective uptake of contraception services included poor service provider’s attitude (33.3%) and congestion at the service centers (4.5%). Respondents with nonuse of contraceptive before first birth are less likely to subsequently use contraceptives (OR= 0.324, 95% CI= 0.1-0.5). Husband approval of contraceptives use was the major determinant of women’s contraceptive use (OR = 3.4, 95% CI = 1.3-8.7). Respondents who had family planning centers not more than 5 kilometers walking distance to their residence did not significantly use contraception services (41.5%) more than 21.1% of those who had to take means of transportation to the service venues. This study showed that majority of the respondents were knowledgeable and aware of contraception services, but husband’s agreement on the use of modern contraceptives remains poor. Programmes that enhances husbands approval of modern contraception is thus recommended.

Keywords: contraception services, service provider’s attitude, uptake, husbands approval

Procedia PDF Downloads 343
4614 Understanding the Effectiveness of Branding Strategies in Car Rental Service Business in India

Authors: Vrajesh Chokshi

Abstract:

In last three decades, the global economy is substantially changed. Today, we are living in highly inter-connected world. The global markets are more open and consumers are well informed about products and services. The information technology revolution has broken all barriers in global business. The E-commerce has given opportunities of global trades to corporate. The IT is extensively used in almost all industries. After liberalization in 1992, the Indian economy is also significantly changed. The IT (information technology) and ITES (IT enable services) are extensively used in supply chain management. In India, previously car rental service business was dominated by local organization and operated through local contact. This industry is very lucrative and to catch this opportunity, many new corporate have ventured into e-commerce car rental service business in India. As the market is very competitive, branding is also very important part of marketing strategy. Now, the E-commerce portals those are in car rental business in India have realized the importance of the same and have started usage of all types of communication channel to promote their brand in different Indian markets. At consumer side, the awareness is also being considerably increased due to marketing communication campaign run by these companies. This paper aims to understand effectiveness of branding strategies in car rental business in India and also tries to identify unique promotional strategies to consolidate brand image of this business in different Indian markets.

Keywords: branding strategies, car rental business, CRM (customer relationship management), ITES (information technology enabled services)

Procedia PDF Downloads 283
4613 Collaborative Program Student Community Service as a New Approach for Development in Rural Area in Case of Western Java

Authors: Brian Yulianto, Syachrial, Saeful Aziz, Anggita Clara Shinta

Abstract:

Indonesia, with a population of about two hundred and fifty million people in quantity, indicates the outstanding wealth of human resources. Hundreds of millions of the population scattered in various communities in various regions in Indonesia with the different characteristics of economic, social and unique culture. Broadly speaking, the community in Indonesia is divided into two classes, namely urban communities and rural communities. The rural communities characterized by low potential and management of natural and human resources, limited access of development, and lack of social and economic infrastructure, and scattered and isolated population. West Java is one of the provinces with the largest population in Indonesia. Based on data from the Central Bureau of Statistics in 2015 the number of population in West Java reached 46.7096 million souls spread over 18 districts and 9 cities. The big difference in geographical and social conditions of people in West Java from one region to another, especially the south to the north causing the gap is high. It is closely related to the flow of investment to promote the area. Poverty and underdevelopment are the classic problems that occur on a massive scale in the region as the effects of inequity in development. South Cianjur and Tasikmalaya area South became one of the portraits area where the existing potential has not been capable of prospering society. Tri Dharma College not only define the College as a pioneer implementation of education and research to improve the quality of human resources but also demanded to be a pioneer in the development through the concept of public service. Bandung Institute of Technology as one of the institutions of higher education to implement community service system through collaborative community work program "one of the university community" as one approach to developing villages. The program is based Community Service, where students are not only required to be able to take part in community service, but also able to develop a community development strategy that is comprehensive and integrity in cooperation with government agencies and non-government related as a real form of effort alignment potential, position and role from various parties. Areas of western Java in particular have high poverty rates and disparity. On the other hand, there are three fundamental pillars in the development of rural communities, namely economic development, community development, and the integrated infrastructure development. These pillars require the commitment of all components of community, including the students and colleges for upholding success. College’s community program is one of the approaches in the development of rural communities. ITB is committed to implement as one form of student community service as community-college programs that integrate all elements of the community which is called Kuliah Kerja Nyata-Thematic.

Keywords: development in rural area, collaborative, student community service, Kuliah Kerja Nyata-Thematic ITB

Procedia PDF Downloads 208
4612 Convectory Policing-Reconciling Historic and Contemporary Models of Police Service Delivery

Authors: Mark Jackson

Abstract:

Description: This paper is based on an theoretical analysis of the efficacy of the dominant model of policing in western jurisdictions. Those results are then compared with a similar analysis of a traditional reactive model. It is found that neither model provides for optimal delivery of services. Instead optimal service can be achieved by a synchronous hybrid model, termed the Convectory Policing approach. Methodology and Findings: For over three decades problem oriented policing (PO) has been the dominant model for western police agencies. Initially based on the work of Goldstein during the 1970s the problem oriented framework has spawned endless variants and approaches, most of which embrace a problem solving rather than a reactive approach to policing. This has included the Area Policing Concept (APC) applied in many smaller jurisdictions in the USA, the Scaled Response Policing Model (SRPM) currently under trial in Western Australia and the Proactive Pre-Response Approach (PPRA) which has also seen some success. All of these, in some way or another, are largely based on a model that eschews a traditional reactive model of policing. Convectory Policing (CP) is an alternative model which challenges the underpinning assumptions which have seen proliferation of the PO approach in the last three decades and commences by questioning the economics on which PO is based. It is argued that in essence, the PO relies on an unstated, and often unrecognised assumption that resources will be available to meet demand for policing services, while at the same time maintaining the capacity to deploy staff to develop solutions to the problems which were ultimately manifested in those same calls for service. The CP model relies on the observations from a numerous western jurisdictions to challenge the validity of that underpinning assumption, particularly in fiscally tight environment. In deploying staff to pursue and develop solutions to underpinning problems, there is clearly an opportunity cost. Those same staff cannot be allocated to alternative duties while engaged in a problem solution role. At the same time, resources in use responding to calls for service are unavailable, while committed to that role, to pursue solutions to the problems giving rise to those same calls for service. The two approaches, reactive and PO are therefore dichotomous. One cannot be optimised while the other is being pursued. Convectory Policing is a pragmatic response to the schism between the competing traditional and contemporary models. If it is not possible to serve either model with any real rigour, it becomes necessary to taper an approach to deliver specific outcomes against which success or otherwise might be measured. CP proposes that a structured roster-driven approach to calls for service, combined with the application of what is termed a resource-effect response capacity has the potential to resolve the inherent conflict between traditional and models of policing and the expectations of the community in terms of community policing based problem solving models.

Keywords: policing, reactive, proactive, models, efficacy

Procedia PDF Downloads 464
4611 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 324
4610 A User Interface for Easiest Way Image Encryption with Chaos

Authors: D. López-Mancilla, J. M. Roblero-Villa

Abstract:

Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.

Keywords: image encryption, chaos, secure communications, user interface

Procedia PDF Downloads 469
4609 Smuggling of Migrants as an Influential Factor on National Security, Economic and Social Life

Authors: Jordan Georgiev Deliversky

Abstract:

Human trafficking and smuggling of migrants are criminal activities, which are on the rise over recent years. The number of legal migrants arrived in Europe from outside the European Union are far less than those who want to come and settle in Europe. The objective of this paper is to present the impact on economic and social life of significant measures influencing the smuggling of migrants. The analysis is focused on various complex factors which have multiple origins and are highly influential as regard to the process of migration and the smuggling of migrants. The smuggling of migrants is a criminal activity, directly related to migration. The main results show that often the routes chosen for smuggling of migrants are circuitous, as smugglers carefully avoid strictly controlled roads, checkpoints, and countries or jurisdictions where there is efficiency of justice, with particular emphasis on the law on trafficking of persons and smuggling of migrants.

Keywords: corruption, migration, security, smuggling

Procedia PDF Downloads 245
4608 Effective Service Provision and Multi-Agency Working in Service Providers for Children and Young People with Special Educational Needs and Disabilities: A Mixed Methods Systematic Review

Authors: Natalie Tyldesley-Marshall, Janette Parr, Anna Brown, Yen-Fu Chen, Amy Grove

Abstract:

It is widely recognised in policy and research that the provision of services for children and young people (CYP) with Special Educational Needs and Disabilities (SEND) is enhanced when health and social care, and education services collaborate and interact effectively. In the UK, there have been significant changes to policy and provisions which support and improve collaboration. However, professionals responsible for implementing these changes face multiple challenges, including a lack of specific implementation guidance or framework to illustrate how effective multi-agency working could or should work. This systematic review will identify the key components of effective multi-agency working in services for CYP with SEND; and the most effective forms of partnership working in this setting. The review highlights interventions that lead to service improvements; and the conditions in the local area that support and encourage success. A protocol was written and registered with PROSPERO registration: CRD42022352194. Searches were conducted on several health, care, education, and applied social science databases from the year 2012 onwards. Citation chaining has been undertaken, as well as broader grey literature searching to enrich the findings. Qualitative, quantitative, mixed methods studies and systematic reviews were included, assessed independently, and critically appraised or assessed for risk of bias using appropriate tools based on study design. Data were extracted in NVivo software and checked by a more experienced researcher. A convergent segregated approach to synthesis and integration was used in which the quantitative and qualitative data were synthesised independently and then integrated using a joint display integration matrix. Findings demonstrate the key ingredients for effective partnership working for services delivering SEND. Interventions deemed effective are described, and lessons learned across interventions are summarised. Results will be of interest to educators and health and social care professionals that provide services to those with SEND. These will also be used to develop policy recommendations for how UK healthcare, social care, and education services for CYP with SEND aged 0-25 can most effectively collaborate and achieve service improvement. The review will also identify any gaps in the literature to recommend areas for future research. Funding for this review was provided by the Department for Education.

Keywords: collaboration, joint commissioning, service delivery, service improvement

Procedia PDF Downloads 82
4607 Challenges of Implementing Participatory Irrigation Management for Food Security in Semi Arid Areas of Tanzania

Authors: Pilly Joseph Kagosi

Abstract:

The study aims at assessing challenges observed during the implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation, and literature review. Data collected from the questionnaire was analysed using SPSS while PRA data was analysed with the help of local communities during PRA exercise. Data from other methods were analysed using content analysis. The study revealed that PIM approach has a contribution in improved food security at household level due to the involvement of communities in water management activities and decision making which enhanced the availability of water for irrigation and increased crop production. However, there were challenges observed during the implementation of the approach including; minimum participation of beneficiaries in decision-making during planning and designing stages, meaning inadequate devolution of power among scheme owners. Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However, it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.

Keywords: challenges, participatory approach, irrigation management, food security, semi arid areas

Procedia PDF Downloads 310
4606 Implementing Quality Improvement Projects to Enhance Contraception and Abortion Care Service Provision and Pre-Service Training of Health Care Providers

Authors: Munir Kassa, Mengistu Hailemariam, Meghan Obermeyer, Kefelegn Baruda, Yonas Getachew, Asnakech Dessie

Abstract:

Improving the quality of sexual and reproductive health services that women receive is expected to have an impact on women’s satisfaction with the services, on their continued use and, ultimately, on their ability to achieve their fertility goals or reproductive intentions. Surprisingly, however, there is little empirical evidence of either whether this expectation is correct, or how best to improve service quality within sexual and reproductive health programs so that these impacts can be achieved. The Recent focus on quality has prompted more physicians to do quality improvement work, but often without the needed skill sets, which results in poorly conceived and ultimately unsuccessful improvement initiatives. As this renders the work unpublishable, it further impedes progress in the field of health care improvement and widens the quality chasm. Moreover, since 2014, the Center for International Reproductive Health Training (CIRHT) has worked diligently with 11 teaching hospitals across Ethiopia to increase access to contraception and abortion care services. This work has included improving pre-service training through education and curriculum development, expanding hands-on training to better learn critical techniques and counseling skills, and fostering a “team science” approach to research by encouraging scientific exploration. This is the first time this systematic approach has been applied and documented to improve access to high-quality services in Ethiopia. The purpose of this article is to report initiatives undertaken, and findings concluded by the clinical service team at CIRHT in an effort to provide a pragmatic approach to quality improvement projects. An audit containing nearly 300 questions about several aspects of patient care, including structure, process, and outcome indicators was completed by each teaching hospital’s quality improvement team. This baseline audit assisted in identifying major gaps and barriers, and each team was responsible for determining specific quality improvement aims and tasks to support change interventions using Shewart’s Cycle for Learning and Improvement (the Plan-Do-Study-Act model). To measure progress over time, quality improvement teams met biweekly and compiled monthly data for review. Also, site visits to each hospital were completed by the clinical service team to ensure monitoring and support. The results indicate that applying an evidence-based, participatory approach to quality improvement has the potential to increase the accessibility and quality of services in a short amount of time. In addition, continued ownership and on-site support are vital in promoting sustainability. This approach could be adapted and applied in similar contexts, particularly in other African countries.

Keywords: abortion, contraception, quality improvement, service provision

Procedia PDF Downloads 190
4605 Existence of Financial Service Authority Prior to 2045

Authors: Syafril Hendrik Hutabarat, Hartiwiningsih, Pujiyono Suwadi

Abstract:

The Financial Service Authority (FSA) was formed as a response to the 1997 monetary crisis and the 2008 financial crisis so that it was more defensive in nature while developments in information and communication technology have required state policies to be more offensive to keep up with times. Reconstruction of Authorities of the FSA's Investigator is intended to keep the agency worthy to be part of an integrated criminal justice system in Indonesia which has implications for expanding its authority in line with efforts to protect and increase the welfare of the people. The results show that internal synergy between sub-sectors in the financial services sector is not optimised, some are even left behind so that the FSA is not truly an authority in the financial services sector. This research method is empirical. The goal of synergy must begin with internal synergy which has its moment when Indonesia gets a demographic bonus in the 2030s and becomes an international logistics hub supported by the national financial services sector.

Keywords: reconstruction, authorities, FSA investigators, synergy, demography

Procedia PDF Downloads 60
4604 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 131
4603 Resilient Regions for Purpose of Crisis Management

Authors: Jana Gebhartova, Tomas Duda, Ivan Benes

Abstract:

World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.

Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies

Procedia PDF Downloads 361
4602 Role of Financial Institutions in Promoting Micro Service Enterprises with Special Reference to Hairdressing Salons

Authors: Gururaj Bhajantri

Abstract:

Financial sector is the backbone of any economy and it plays a crucial role in the mobilisation and allocation of resources. One of the main objectives of financial sector is inclusive growth. The constituents of the financial sector are banks, and financial Institutions, which mobilise the resources from the surplus sector and channelize the same to the different needful sectors in the economy. Micro Small and the Medium Enterprises sector in India cover a wide range of economic activities. These enterprises are divided on the basis of investment on equipment. The micro enterprises are divided into manufacturing and services sector. Micro Service enterprises have investment limit up to ten lakhs on equipment. Hairdresser is one who not only cuts and shaves but also provides different types of hair cut, hairstyles, trimming, hair-dye, massage, manicure, pedicure, nail services, colouring, facial, makeup application, waxing, tanning and other beauty treatments etc., hairdressing salons provide these services with the help of equipment. They need investment on equipment not more than ten lakhs. Hence, they can be considered as Micro service enterprises. Hairdressing salons require more than Rs 2.50,000 to start a moderate salon. Moreover, hairdressers are unable to access the organised finance. Still these individuals access finance from money lenders with high rate of interest to lead life. The socio economic conditions of hairdressers are not known properly. Hence, the present study brings a light on the role of financial institutions in promoting hairdressing salons. The study also focuses the socio-economic background of individuals in hairdressings salons, problems faced by them. The present study is based on primary and secondary data. Primary data collected among hairdressing salons in Davangere city. Samples selected with the help of simple random sampling techniques. Collected data analysed and interpreted with the help of simple statistical tools.

Keywords: micro service enterprises, financial institutions, hairdressing salons, financial sector

Procedia PDF Downloads 185
4601 The Research on Human Resource Management Problem of Turkish Fast Food Company

Authors: Mai Maitiaili Tuerdi

Abstract:

Turkey is one of the countries in which fast food service is growing increasingly in the world. The emergence of KFC and McDonald's to Turkish market is affecting every aspects of local fast-food services. The Turkey's famous catering companies named "Simit Sarayi" and "Güllüoğlu" are famous for accepting the Western fast food management service and skills in order to increase their market share. Also, they have created their unique management skills in this field. In this paper, through empirical and comparative study method we will analyze the famous Turkish local fast-food companies and western human resource management. We will argue how to create and adapt the human resource management while the company is economically and socially growing.

Keywords: human resources management, Turkey, fast food, management

Procedia PDF Downloads 326
4600 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 60
4599 Reliability and Maintainability Optimization for Aircraft’s Repairable Components Based on Cost Modeling Approach

Authors: Adel A. Ghobbar

Abstract:

The airline industry is continuously challenging how to safely increase the service life of the aircraft with limited maintenance budgets. Operators are looking for the most qualified maintenance providers of aircraft components, offering the finest customer service. Component owner and maintenance provider is offering an Abacus agreement (Aircraft Component Leasing) to increase the efficiency and productivity of the customer service. To increase the customer service, the current focus on No Fault Found (NFF) units must change into the focus on Early Failure (EF) units. Since the effect of EF units has a significant impact on customer satisfaction, this needs to increase the reliability of EF units at minimal cost, which leads to the goal of this paper. By identifying the reliability of early failure (EF) units with regards to No Fault Found (NFF) units, in particular, the root cause analysis with an integrated cost analysis of EF units with the use of a failure mode analysis tool and a cost model, there will be a set of EF maintenance improvements. The data used for the investigation of the EF units will be obtained from the Pentagon system, an Enterprise Resource Planning (ERP) system used by Fokker Services. The Pentagon system monitors components, which needs to be repaired from Fokker aircraft owners, Abacus exchange pool, and commercial customers. The data will be selected on several criteria’s: time span, failure rate, and cost driver. When the selected data has been acquired, the failure mode and root cause analysis of EF units are initiated. The failure analysis approach tool was implemented, resulting in the proposed failure solution of EF. This will lead to specific EF maintenance improvements, which can be set-up to decrease the EF units and, as a result of this, increasing the reliability. The investigated EFs, between the time period over ten years, showed to have a significant reliability impact of 32% on the total of 23339 unscheduled failures. Since the EFs encloses almost one-third of the entire population.

Keywords: supportability, no fault found, FMEA, early failure, availability, operational reliability, predictive model

Procedia PDF Downloads 105
4598 Ensuring Continuity in Subcutaneous Depot Medroxy Progesterone Acetate (DMPA-SC) Contraception Service Provision Using Effective Commodity Management Practices

Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu

Abstract:

Background: The Delivering Innovations in Selfcare (DISC) project aims to increase access to self-care options for women of reproductive age, starting with self-inject subcutaneous depot medroxyprogesterone acetate (DMPA-SC) contraception services. However, the project has faced challenges in ensuring the continuous availability of the commodity in health facilities. Although most states in the country rely on the federal ministry of Health for supplies, some are gradually funding the procurement of Family Planning (FP) commodities. This attempt is, however, often accompanied by procurement delays and purchases inadequate to meet demand. This dilemma was further exacerbated by the commencement of demand generation activities by the project in supported states which geometrically increased commodity utilization rates and resulted in receding stock and occasional service disruptions. Strategies: The project deployed various strategies were implemented to ensure the continuous availability of commodities. These include facilitating inter-facility transfer, monthly tracking of commodity utilization, and alerting relevant authorities when stock levels reach a minimum. And supporting state-level procurement of DMPA-SC commodities through catalytic interventions. Results: Effective monitoring of commodity inventory at the facility level and strategic engagement with federal and state-level logistics units have proven successful in mitigating stock-out of commodities. It has helped secure up to 13,000 units of DMPA-SC commodities from federal logistics units and enabled state units to prioritize supported sites. This has ensured the continuity of DMPA-SC services and an increasing trend in the practice of self-injection. Conclusion: A functional supply chain is crucial to achieving commodity security, and without it, health programs cannot succeed. Stakeholder engagement, stock management and catalytic interventions have provided both short- and long-term measures to mitigate stock-outs and ensured a consistent supply of commodities to clients.

Keywords: family planning, contraception, DMPA-SC, self-care, self-injection, commodities, stock-out

Procedia PDF Downloads 67
4597 Biochar and Food Security in Central Uganda

Authors: Nataliya Apanovich, Mark Wright

Abstract:

Uganda is among the poorest but fastest growing populations in the world. Its annual population growth of 3% puts additional stress through land fragmentation, agricultural intensification, and deforestation on already highly weathered tropical (Ferralsol) soils. All of these factors lead to decreased agricultural yields and consequently diminished food security. The central region of Uganda, Buganda Kingdom, is especially vulnerable in terms of food security as its high population density coupled with mismanagement of natural resources led to gradual loss of its soil and even changes in microclimate. These changes are negatively affecting livelihoods of smallholder farmers who comprise 80% of all population in Uganda. This research focuses on biochar for soil remediation in Masaka District, Uganda. If produced on a small scale from locally sourced materials, biochar can increase the quality of soil in a cost and time effective manner. To assess biochar potential, 151 smallholder farmers were interviewed on the types of crops grown, agricultural residues produced and their use, as well as on attitudes towards biochar use and its production on a small scale. The interviews were conducted in 7 sub-counties, 32 parishes, and 92 villages. The total farmland covered by the study was 606.2 kilometers. Additional information on the state of agricultural development and environmental degradation in the district was solicited from four local government officials via informal interviews. This project has been conducted in collaboration with the international agricultural research institution, Makerere University in Kampala, Uganda. The results of this research can have implications on the way farmers perceive the value of their agricultural residues and what they decide to do with them. The underlying objective is to help smallholders in degraded soils increase their agricultural yields through the use of biochar without diverting the already established uses of agricultural residues to a new soil management practice.

Keywords: agricultural residues, biochar, central Uganda, food security, soil erosion, soil remediation

Procedia PDF Downloads 262