Search results for: national security strategy
8740 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3468739 Upgraded Cuckoo Search Algorithm to Solve Optimisation Problems Using Gaussian Selection Operator and Neighbour Strategy Approach
Authors: Mukesh Kumar Shah, Tushar Gupta
Abstract:
An Upgraded Cuckoo Search Algorithm is proposed here to solve optimization problems based on the improvements made in the earlier versions of Cuckoo Search Algorithm. Short comings of the earlier versions like slow convergence, trap in local optima improved in the proposed version by random initialization of solution by suggesting an Improved Lambda Iteration Relaxation method, Random Gaussian Distribution Walk to improve local search and further proposing Greedy Selection to accelerate to optimized solution quickly and by “Study Nearby Strategy” to improve global search performance by avoiding trapping to local optima. It is further proposed to generate better solution by Crossover Operation. The proposed strategy used in algorithm shows superiority in terms of high convergence speed over several classical algorithms. Three standard algorithms were tested on a 6-generator standard test system and the results are presented which clearly demonstrate its superiority over other established algorithms. The algorithm is also capable of handling higher unit systems.Keywords: economic dispatch, gaussian selection operator, prohibited operating zones, ramp rate limits
Procedia PDF Downloads 1308738 Improving Equipment Life and Overall Equipment Effectiveness (O.E.E.) through Proper Maintenance Strategy Using Value Engineering
Authors: Malay Niraj, Praveen Kumar
Abstract:
The present study is a new approach for improving equipment life and Overall Equipment Efficiency (O.E.E.) through suitable maintenance practice with the help of value engineering. Value engineering is a one of the most powerful decision-making techniques which depend on many factors. The improvements are the result of recommendations made by multidisciplinary teams representing all parties involved. VE is a rigorous, systematic effort to improve the OEE and optimize the life cycle cost of a facility. The study describes problems in maintenance arising due to the absence of having clear criteria and strong decision constrain how to maintain failing equipment. Using factor comparisons, the study has been made between different maintenance practices and finally best maintenance practice based on value engineering technique has been selected.Keywords: maintenance strategy, overall equipment efficiency, value engineering, decision-making
Procedia PDF Downloads 4098737 Technological Tool-Use as an Online Learner Strategy in a Synchronous Speaking Task
Authors: J. Knight, E. Barberà
Abstract:
Language learning strategies have been defined as thoughts and actions, consciously chosen and operationalized by language learners, to help them in carrying out a multiplicity of tasks from the very outset of learning to the most advanced levels of target language performance. While research in the field of Second Language Acquisition has focused on ‘good’ language learners, the effectiveness of strategy-use and orchestration by effective learners in face-to-face classrooms much less research has attended to learner strategies in online contexts, particular strategies in relation to technological tool use which can be part of a task design. In addition, much research on learner strategies and strategy use has been explored focusing on cognitive, attitudinal and metacognitive behaviour with less research focusing on the social aspect of strategies. This study focuses on how learners mediate with a technological tool designed to support synchronous spoken interaction and how this shape their spoken interaction in the opening of their talk. A case study approach is used incorporating notions from communities of practice theory to analyse and understand learner strategies of dyads carrying out a role play task. The study employs analysis of transcripts of spoken interaction in the openings of the talk along with log files of tool use. The study draws on results of previous studies pertaining to the same tool as a form of triangulation. Findings show how learners gain pre-task planning time through technological tool control. The strategies involving learners’ choices to enter and exit the tool shape their spoken interaction qualitatively, with some cases demonstrating long silences whilst others appearing to start the pedagogical task immediately. Who/what learners orientate to in the openings of the talk: an audience (i.e. the teacher), each other and/or screen-based signifiers in the opening moments of the talk also becomes a focus. The study highlights how tool use as a social practice should be considered a learning strategy in online contexts whereby different usages may be understood in the light of the more usual asynchronous social practices of the online community. The teachers’ role in the community is also problematised as the evaluator of the practices of that community. Results are pertinent for task design for synchronous speaking tasks. The use of community of practice theory supports an understanding of strategy use that involves both metacognition alongside social context revealing how tool-use strategies may need to be orally (socially) negotiated by learners and may also differ from an online language community.Keywords: learner strategy, tool use, community of practice, speaking task
Procedia PDF Downloads 3418736 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2268735 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1828734 Susanne Bier, Lone Scherfig: Transnationalization Strategies
Authors: Ebru Thwaites Diken
Abstract:
This article analyzes the works of certain directors in Danish cinema, namely Susanne Bier and Lone Sherfig, in the context of transnationalisation of Danish cinema. It looks at how the films' narratives negotiate and reconstruct the local / national / regional and the global. Scholars such as Nestingen & Elkington (2005), Hjort (2010), Higbee and Lim (2010), Bondebjerg and Redvall (2011) address transnationalism of Danish cinema in terms of production and distribution processes and how film making trascends national boundaries. This paper employs a particular understanding of transnationalism - in terms of how ideas and characters travel - to analyze how the storytelling and style has evolved to connect the national, the regional and the global on the basis of the works of these two directors. Strategies such as Hollywoodization - i.e. focus on stardom and classical narration, adhering to conventional European genre formulas, producing Danish films in English language have been identifiable strategies in Danish cinema in the period after the 2000s. Susanne Bier and Lone Scherfig are significant for employing some of these strategies simultaneously. For this reason, this article will look at how these two directors have employed these strategies and negotiated the cultural boundaries and exchanges.Keywords: transnational cinema, danish cinema, susanne bier, lone scherfig
Procedia PDF Downloads 748733 Employing Nudge as Artistic Strategy in Managing Lagos Waste Issues
Authors: Iranlade Festus Adeyem
Abstract:
This paper analyses the role played by the Nudge method as an artistic strategy in addressing the issues of Lagos waste management in Nigeria. As a Lagosian, experiential knowledge of Lagos’ dirty environment through careless littering, especially in the Lagos Mainland community, was helpful. Employing Nudge theory in creative waste recycling assists in persuading Lagosians through strategic sensitization to carefully weigh their options rather than being compelled to act in a dictated direction. Empirical awareness of Lagos’ environment and creative, reflective experiences were handy in inspiring the identified communities to subtly encourage the reuse, recycling and repurposing of generated waste instead of dumping it indiscriminately. The repurposed waste used to ‘upcycle’ and ‘downcycle’ contemporary artworks were displayed to highlight single-use materials as improvised alternatives to conventional ones. The Nudge concept application, therefore, persuades Lagosians, Lagos artists and trainees to see waste as untapped effective materials during the campaigns. Using the Nudge philosophy thus encourages Lagosians and creatives to use personal discretion in managing their generated waste naturally. Its application also helped intervene minimally in the Lagos waste objectives to prevent the attendant health issues that may occur. And inspire waste improvisation for the scarce, imported and expensive art materials in Lagos City.Keywords: improvisation, nudge, upcycle and downcycle, strategy
Procedia PDF Downloads 98732 Territorialisation and Elections: Land and Politics in Benin
Authors: Kamal Donko
Abstract:
In the frontier zone of Benin Republic, land seems to be a fundamental political resource as it is used as a tool for socio-political mobilization, blackmail, inclusion and exclusion, conquest and political control. This paper seeks to examine the complex and intriguing interlinks between land, identity and politics in central Benin. It aims to investigate what roles territorialisation and land ownership are playing in the electioneering process in central Benin. It employs ethnographic multi-sited approach to data collections including observations, interviews and focused group discussions. Research findings reveal a complex and intriguing relationship between land ownership and politics in central Benin. Land is found to be playing a key role in the electioneering process in the region. The study has also discovered many emerging socio-spatial patterns of controlling and maintaining political power in the zone which are tied to land politics. These include identity reconstruction and integration mechanism through intermarriages, socio-political initiatives and construction of infrastructure of sovereignty. It was also found that ‘Diaspora organizations’ and identity issues; strategic creation of administrative units; alliance building strategy; gerrymandering local political field, etc. These emerging socio-spatial patterns of territorialisation for maintaining political power affect migrant and native communities’ relationships. It was also found that ‘Diaspora organizations’ and identity issues; strategic creation of administrative units; alliance building strategy; gerrymandering local political field, etc. are currently affecting migrant’s and natives’ relationships. The study argues that territorialisation is not only about national boundaries and the demarcation between different nation states, but more importantly, it serves as a powerful tool of domination and political control at the grass root level. Furthermore, this study seems to provide another perspective from which the political situation in Africa can be studied. Investigating how the dynamics of land ownership is influencing politics at the grass root or micro level, this study is fundamental to understanding spatial issues in the frontier zone.Keywords: land, migration, politics, territorialisation
Procedia PDF Downloads 3618731 Comparison of Dubbing and Subtitling through Critical Discourse Analysis: Detecting Lexical Differences and Similarities in the Movie 'The Girl with the Dragon Tattoo'
Authors: Saber Noie, F. Jafarpour
Abstract:
Translation of the movies was one of important issues of the translators. In this study, the notions of ‘foreignization’, ‘domestication’, and ‘critical discourse analysis’ (CDA) in translation studies were discussed. This study is a comparative study and attempts towards clarifying the lexical differences and similarities between dubbing and subtitling in audiovisual translation through CDA. The strategies proposed by Venuti (1995) and Newmark (1988) used first by researcher and then, the researcher went back to the Van Dijk’s CDA (1995), in the part dominance. This study shows that according to CDA, the dominant strategy in subtitling is foreignization and dominant strategy in dubbing is domestication.Keywords: critical discourse analysis, CDA, dub, subtitle, foreignization, domestication
Procedia PDF Downloads 2788730 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues
Authors: Akram Waheb Nasef Alzordoky
Abstract:
The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 218729 The Impact of University League Tables on the Development of Non-Elite Universities. A Case Study of England
Authors: Lois Cheung
Abstract:
This article examines the impact of League Tables on non-elite universities in the English higher education system. The purpose of this study is to explore the use of rankings in strategic planning by low-ranked universities in this highly competitive higher education market. A sample of non-elite universities was selected for a content analysis based on the measures used by The Guardian rankings. Interestingly, these universities care about their rankings within a single national system. The content analysis appears to be an effective approach to investigating the presence of such influences. It is particularly noteworthy that all sampled universities use these measure terminologies in their strategic plans, missions and news coverage on their institutional web-pages. This analysis may be an example of the key challenges that many low-ranking universities in England are probably facing in the highly competitive and diversified higher education market. These universities use rankings to communicate with their stakeholders, mainly students, in order to fill places to secure their major source of funding. The study concludes with comments on the likely effects of the rankings paradigm in undermining the contributions of non-elite universities.Keywords: League tables, measures, post-1992 universities, ranking, strategy
Procedia PDF Downloads 1838728 Strategies by National Health Systems in the Northern Hemisphere Against COVID-19
Authors: Aysha Zahidie, Meesha Iqbal
Abstract:
This paper aims to assess the effectiveness of strategies adopted by national health systems across the globe in different ‘geographical regions’ in the Northern Hemisphere to combat COVID-19 pandemic. Data is included from the first case reported in November 2019 till mid-April 2020. Sources of information are COVID-19 case repositories, official country websites, university research teams’ perspectives, official briefings, and available published research articles to date. We triangulated all data to formulate a comprehensive illustration of COVID-19 situation in each country included. It has been found that the 2002-2004 SARS outbreak experienced in China, Taiwan, and South Korea saw better strategies adopted by leadership to combat COVID-19 pandemic containment as compared to Iran, Italy, and the United States of America. Saudi Arabia has so far been successful in the implementation of containment strategies as there have been no large outbreaks in major cities or confined areas such as prisons. The situation has yet to unfold in India and Pakistan, which exhibit their own weaknesses in policy formulation or implementation in response to health crises.Keywords: national health systems, COVID-19, prevention, response
Procedia PDF Downloads 1128727 Climate Change and Human Migration
Authors: Sungwoo Park
Abstract:
The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.Keywords: climate change, climate migration, global security, refugee crisis
Procedia PDF Downloads 3468726 Inclusive Education in Nigeria Prospects and Challenges
Authors: Laraba Bala Mohammed
Abstract:
Education is a very vital tool in enhancement of the general development of individuals in the society who would participate effectively in national development processes, including people with special need, educating children with special needs is one of the greatest challenges of this millennium, this is because professionals in the field of special education are operating in an exciting and rapidly changing phenomenon. Inclusive education in Nigeria is not a new development in the teaching and learning process, but the most important aspect is the utilization and effective integration of people with special needs in the society. This paper focuses on the need of parents, government, professionals in the field of special education and stakeholders to work together for the full implementation of inclusive education in Nigeria.Keywords: inclusive education, national policy, education, special needs
Procedia PDF Downloads 5078725 Image Steganography Using Predictive Coding for Secure Transmission
Authors: Baljit Singh Khehra, Jagreeti Kaur
Abstract:
In this paper, steganographic strategy is used to hide the text file inside an image. To increase the storage limit, predictive coding is utilized to implant information. In the proposed plan, one can exchange secure information by means of predictive coding methodology. The predictive coding produces high stego-image. The pixels are utilized to insert mystery information in it. The proposed information concealing plan is powerful as contrasted with the existing methodologies. By applying this strategy, a provision helps clients to productively conceal the information. Entropy, standard deviation, mean square error and peak signal noise ratio are the parameters used to evaluate the proposed methodology. The results of proposed approach are quite promising.Keywords: cryptography, steganography, reversible image, predictive coding
Procedia PDF Downloads 4178724 Wedding Organizer Strategy in the Era Covid-19 Pandemic In Surabaya, Indonesia
Authors: Rifky Cahya Putra
Abstract:
At this time of corona makes some countries affected difficult. As a result, many traders or companies are difficult to work in this pandemic era. So human activities in some fields must implement a new lifestyle or known as new normal. The transition from the one activity to another certainly requires high adaptation. So that almost in all sectors experience the impact of this phase, on of which is the wedding organizer. This research aims to find out what strategies are used so that the company can run in this pandemic. Techniques in data collection in the form interview to the owner of the wedding organizer and his team. Data analysis qualitative descriptive use interactive model analysis consisting of three main things, namely data reduction, data presentaion, and conclusion. For the result of the interview, the conclusion is that there are three strategies consisting of social media, sponsorship, and promotion.Keywords: strategy, wedding organizer, pandemic, indonesia
Procedia PDF Downloads 1358723 Study of Components and Effective Factors on Organizational Commitment of Khoramabad Branchs Islamic Azad University’s Faculty Members
Authors: Mehry Daraei
Abstract:
The goal of this study was to survey the components and affective factors on organizational commitment of Islamic Azad university Khoramabad Baranch’s faculty members. The research method was correlation by causal modeling and data were gathered by questionnaire. Statistical society consisted of 147 faculty members in Islamic Azad University Khoramabad Branch and sample size was determined as 106 persons by Morgan’s sample table that were selected by class sampling. Correlation test, T-single group test and path analysis test were used for analysis of data. Data were analyzed by Lisrel software. The results showed that organizational corporate was the most effective element on organizational commitment and organizational corporate, experience work and organizational justice were only in direct relation with organizational commitment. Also, job security had direct and indirect effect on OC. Job security had effect on OC by gender. Gender variable had direct and indirect effect on OC. Gender had effect on OC by organizational corporate. Job opportunities out of university also had direct and indirect effect on OC, which means job opportunities had indirect effect on OC by organizational corporate.Keywords: organization, commitment, job security, Islamic Azad University
Procedia PDF Downloads 3238722 Secure Transfer of Medical Images Using Hybrid Encryption
Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 4438721 Tobacco Harm Reduction: How to Build Awareness of Smokers? A Case Study in Indonesia
Authors: Kholil, Ario Bimo, Hifni Alifahmi, Soecahyadi, Husen Money
Abstract:
The number of smokers in Indonesia currently reached 66 million (25.09%) of the total number of smokers reaching 264 million. The government (central and local governments) have issued various rules to reduce the number of smokers, but the results are still not effective; in fact, the number of smokers continues to increase every year. This study aims to determine the influence of demographics, economy, health, and the role of government on the awareness of smokers in reducing the dangers of cigarettes. Data collection was carried out through a questionnaire distributed to 255 randomly selected respondents and data analysis using SEM (Structural Equation Model). The results of the analysis show that economic and socio-cultural factors do not directly affect the awareness of reducing the dangers of cigarettes. But indirectly, its influence becomes significant through intervening variables of communication strategies. Meanwhile, health factors and the government's role have a very significant influence both directly and indirectly on reducing the dangers of cigarettes. Thus, the main strategy to build awareness of smokers in reducing the dangers of smoking is building an effective communication strategy through three main factors: (1) health, (2) government regulations and (3) the economy.Keywords: harm reduction, awareness, communication strategy, SEM
Procedia PDF Downloads 648720 Good Practices for Model Structure Development and Managing Structural Uncertainty in Decision Making
Authors: Hossein Afzali
Abstract:
Increasingly, decision analytic models are used to inform decisions about whether or not to publicly fund new health technologies. It is well noted that the accuracy of model predictions is strongly influenced by the appropriateness of model structuring. However, there is relatively inadequate methodological guidance surrounding this issue in guidelines developed by national funding bodies such as the Australian Pharmaceutical Benefits Advisory Committee (PBAC) and The National Institute for Health and Care Excellence (NICE) in the UK. This presentation aims to discuss issues around model structuring within decision making with a focus on (1) the need for a transparent and evidence-based model structuring process to inform the most appropriate set of structural aspects as the base case analysis; (2) the need to characterise structural uncertainty (If there exist alternative plausible structural assumptions (or judgements), there is a need to appropriately characterise the related structural uncertainty). The presentation will provide an opportunity to share ideas and experiences on how the guidelines developed by national funding bodies address the above issues and identify areas for further improvements. First, a review and analysis of the literature and guidelines developed by PBAC and NICE will be provided. Then, it will be discussed how the issues around model structuring (including structural uncertainty) are not handled and justified in a systematic way within the decision-making process, its potential impact on the quality of public funding decisions, and how it should be presented in submissions to national funding bodies. This presentation represents a contribution to the good modelling practice within the decision-making process. Although the presentation focuses on the PBAC and NICE guidelines, the discussion can be applied more widely to many other national funding bodies that use economic evaluation to inform funding decisions but do not transparently address model structuring issues e.g. the Medical Services Advisory Committee (MSAC) in Australia or the Canadian Agency for Drugs and Technologies in Health.Keywords: decision-making process, economic evaluation, good modelling practice, structural uncertainty
Procedia PDF Downloads 1868719 Grey Prediction of Atmospheric Pollutants in Shanghai Based on GM(1,1) Model Group
Authors: Diqin Qi, Jiaming Li, Siman Li
Abstract:
Based on the use of the three-point smoothing method for selectively processing original data columns, this paper establishes a group of grey GM(1,1) models to predict the concentration ranges of four major air pollutants in Shanghai from 2023 to 2024. The results indicate that PM₁₀, SO₂, and NO₂ maintain the national Grade I standards, while the concentration of PM₂.₅ has decreased but still remains within the national Grade II standards. Combining the forecast results, recommendations are provided for the Shanghai municipal government's efforts in air pollution prevention and control.Keywords: atmospheric pollutant prediction, Grey GM(1, 1), model group, three-point smoothing method
Procedia PDF Downloads 358718 Automatic Generation of Census Enumeration Area and National Sampling Frame to Achieve Sustainable Development Goals
Authors: Sarchil H. Qader, Andrew Harfoot, Mathias Kuepie, Sabrina Juran, Attila Lazar, Andrew J. Tatem
Abstract:
The need for high-quality, reliable, and timely population data, including demographic information, to support the achievement of the sustainable development goals (SDGs) in all countries was recognized by the United Nations' 2030 Agenda for sustainable development. However, many low and middle-income countries lack reliable and recent census data. To achieve reliable and accurate census and survey outputs, up-to-date census enumeration areas and digital national sampling frames are critical. Census enumeration areas (EAs) are the smallest geographic units for collection, disseminating, and analyzing census data and are often used as a national sampling frame to serve various socio-economic surveys. Even for countries that are wealthy and stable, creating and updating EAs is a difficult yet crucial step in preparing for a national census. Such a process is commonly done manually, either by digitizing small geographic units on high-resolution satellite imagery or walking the boundaries of units, both of which are extremely expensive. We have developed a user-friendly tool that could be employed to generate draft EA boundaries automatically. The tool is based on high-resolution gridded population and settlement datasets, GPS household locations, building footprints and uses publicly available natural, man-made and administrative boundaries. Initial outputs were produced in Burkina Faso, Paraguay, Somalia, Togo, Niger, Guinea, and Zimbabwe. The results indicate that the EAs are in line with international standards, including boundaries that are easily identifiable and follow ground features, have no overlaps, are compact and free of pockets and disjoints, and the boundaries are nested within administrative boundaries.Keywords: enumeration areas, national sampling frame, gridded population data, preEA tool
Procedia PDF Downloads 1448717 Northern Ghana’s Sustainable Food Systems: Evaluating the Impact of International Development
Authors: Maxwell Ladogo Abilla
Abstract:
As evidence from the 2007–2008 and 2010 global food and financial crises revealed that food systems were under stress, the idea of sustainable food systems rose to prominence in the discussion of food security. The idea suggests moving away from a conception of food security that emphasizes production in favor of one that is more socially and environmentally conscious and interested in tackling a wide range of issues that have rendered the food system dysfunctional. This study evaluates the efforts made by international development organizations to increase food security in the area, taking into account the persistence of poverty and food insecurity in northern Ghana, utilizing the idea of sustainable food systems as the evaluation criterion. The study used triangulation to address the research questions by combining qualitative interview data with documentary analysis. To better comprehend the concept of sustainability, a variety of discourses and concepts are used, which results in the development of eight doable objectives for attaining sustainable food systems. The study finds that the food system in northern Ghana is unsustainable because of three kinds of barriers, with the practical objectives of developing sustainable food systems serving as the assessment criteria (natural, cultural and economic, and institutional). According to an evaluation of the World Food Programme's development support in northern Ghana, regional challenges to attaining sustainable food systems continue to be unaddressed by global development initiatives. Due to institutional constraints, WFP's interventions fell short of their promise. By demonstrating the need for development partners to enhance institutional efficiency and coordination, enable marginalized communities to access their rights, and prioritize agricultural irrigation in the area, the study makes a contribution to development policy and practice in northern Ghana.Keywords: sustainable, food security, development, institutional
Procedia PDF Downloads 908716 Bio-Grouting Applications in Caprock Sealing for Geological CO2 Storage
Authors: Guijie Sang, Geo Davis, Momchil Terziev
Abstract:
Geological CO2 storage has been regarded as a promising strategy to mitigate the emission of greenhouse gas generated from traditional power stations and energy-intensive industry. Caprocks with very low permeability and ultra-fine pores create viscous and capillary barriers to guarantee CO2 sealing efficiency. However, caprock fractures, either naturally existing or artificially induced due to injection, could provide preferential paths for CO₂ escaping. Seeking an efficient technique to seal and strengthen caprock fractures is crucial. We apply microbial-induced-calcite-precipitation (MICP) technique for sealing and strengthening caprock fractures in the laboratory scale. The MICP bio-grouting technique has several advantages over conventional cement grouting methods, including its low viscosity, micron-size microbes (accessible to fine apertures), and low carbon footprint, among others. Different injection strategies are tested to achieve relatively homogenous calcite precipitation along the fractures, which is monitored dynamically based on laser ultrasonic technique. The MICP process in caprock fractures, which integrates the coupled flow and bio-chemical precipitation, is also modeled and validated through the experiment. The study could provide an effective bio-mediated grouting strategy for caprock sealing and thus ensuring a long-term safe geological CO2 storage.Keywords: caprock sealing, geological CO2 storage, grouting strategy, microbial induced calcite precipitation
Procedia PDF Downloads 1898715 Investigating the Relationship between Bank and Cloud Provider
Authors: Hatim Elhag
Abstract:
Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.Keywords: security, cloud, banking sector, cloud computing
Procedia PDF Downloads 4998714 Bee Keeping for Human-Elephant Conflict Mitigation: A Success Story for Sustainable Tourism in Kibale National Park, Western Uganda
Authors: Dorothy Kagazi
Abstract:
The African elephant (Loxodonta africana) remains one of the most crop-damaging species around Kibale National Park, western Uganda. Elephant crop raiding deprives communities of food and incomes, consequently impacting livelihoods, attitude, and support for conservation. It also attracts an aggressive reaction from local communities including the retaliatory killing of a species that is already endangered and listed under Appendix I of the Convention on Endangered Species of Flora and Fauna (CITES). In order to mitigate against elephant crop raiding and minimize conflict, a number of interventions were devised by the government of Uganda such as physical guarding, scare-shooting, excavation of trenches, growing of unpalatable crops and fire lighting all of which have over the years been implemented around the park. These generated varying degrees of effectiveness but largely never solved the problem of elephants crossing into communities to destroy food and shelter which had a negative effect onto sustainable tourism of the communities who often resorted to killing these animals and hence contributing the falling numbers of these animals. It was until government discovered that there are far more effective ways of deterring these animals from crossing to communities that it commissioned a study to deploy the African honeybee (Apis mellifera scutellata) as a deterrent against elephant crop raiding and income enhancement for local people around the park. These efforts led to a number of projects around Kibale National Park where communities were facilitated to keep bees for human-elephant conflict mitigation and rural income enhancement through the sale of honey. These projects have registered tremendous success in reducing crop damage, enhance rural incomes, influence positive attitude change and ultimately secure community support for elephant and park conservation which is a clear manifestation of sustainable tourism development in the area. To address the issue of sustainability, the project was aligned with four major objectives that contributed to the overall goal of maintaining the areas around the parks and the national park itself in such a manner that it remains viable over an infinite period. Among these included determining deterrence effects of bees against elephant crop raiding, assessing the contribution of beekeeping towards rural income enhancement, determining the impact of community involvement of park conservation and management among others. The project deployed 500 improved hives by placing them at specific and previously identified and mapped out elephant crossing points along the park boundary. A control site was established without any intervention to facilitate comparison of findings and data was collected on elephant raiding frequency, patterns, honey harvested, and community attitude towards the park. A socio-economic assessment was also undertaken to ascertain the contribution of beekeeping to incomes and attitude change. In conclusion, human-wildlife conflicts have disturbed conservation and sustainable tourism development efforts. Such success stories like the beekeeping strategy should hence be extensively discussed and widely shared as a conservation technique for sustainable tourism.Keywords: bees, communities, conservation, elephants
Procedia PDF Downloads 2128713 [Keynote Talk]: Quest for Sustainability in the Midst of Conflict Between Climate and Energy Security
Authors: Deepak L. Waikar
Abstract:
Unprecedented natural as well as human made disasters have been responsible for loss of hundreds of thousands of lives, injury & displacement of millions of people and damages in billions of dollars in various parts of the world. Scientists, experts, associations and united nation have been warning about colossal disregard for human safety and environment in exploiting natural resources for insatiable greed for economic growth and rising lavish life style of the rich. Usual blame game is routinely played at international forums & summits by vested interests in developing and developed nations, while billions of people continue to suffer in abject energy poverty. Energy security, on the other hand, is becoming illusive with the dominance of few players in the market, poor energy governance mechanisms, volatile prices and geopolitical conflicts in supply chain. Conflicting scenarios have been cited as one of the major barriers for transformation to a low carbon economy. Policy makers, researchers, academics, businesses, industries and communities have been evaluating sustainable alternatives, albeit at snail’s pace. This presentation focuses on technologies, energy governance, policies & practices, economics and public concerns about safe, prudent & sustainable harnessing of energy resources. Current trends and potential research & development projects in power & energy sectors which students can undertake will be discussed. Speaker will highlight on how youths can be engaged in meaningful, safe, enriching, inspiring and value added self-development programmes in our quest for sustainability in the midst of conflict between climate and energy security.Keywords: clean energy, energy policy, energy security, sustainable energy
Procedia PDF Downloads 4878712 Malaysia as a Case Study for Climate Policy Integration into Energy Policy
Authors: Marcus Lee
Abstract:
The energy sector is the largest contributor of greenhouse gas emissions in Malaysia, which induces climate change. The climate change problem is therefore an energy sector problem. Tackling climate change issues successfully is contingent on actions taken in the energy sector. The researcher propounds that ‘Climate Policy Integration’ (CPI) into energy policy is a viable and insufficiently developed strategy in Malaysia that promotes the synergies between climate change and energy objectives, in order to achieve the targets found in both climate change and energy policies. In exploring this hypothesis, this paper presentation will focus on two particular aspects. Firstly, the meaning of CPI as an approach and as a concept will be explored. As an approach, CPI into energy policy means the integration of climate change objectives into the energy policy area. Its subject matter focuses on establishing the functional interrelations between climate change and energy objectives, by promoting their synergies and minimising their contradictions. However, its conceptual underpinnings are less than straightforward. Drawing from the ‘principle of integration’ found in international treaties and declarations such as the Stockholm Declaration 1972, the Rio Declaration 1992 and the United Nations Framework on Climate Change 1992 (‘UNFCCC’), this paper presentation will explore the contradictions in international standards on how the sustainable development tenets of environmental sustainability, social development and economic development are to be balanced and its relevance to CPI. Further, the researcher will consider whether authority may be derived from international treaties and declarations in order to argue for the prioritisation of environmental sustainability over the other sustainable development tenets through CPI. Secondly, this paper presentation will also explore the degree to which CPI into energy policy has been achieved and pursued in Malaysia. In particular, the strength of the conceptual framework with regard to CPI in Malaysian governance will be considered by assessing Malaysia’s National Policy on Climate Change (2009) (‘NPCC 2009’). The development (or the lack of) of CPI as an approach since the publication of the NPCC 2009 will also be assessed based on official government documents and policies that may have a climate change and/or energy agenda. Malaysia’s National Renewable Energy Policy and Action Plan (2010), draft National Energy Efficiency Action Plan (2014), Intended Nationally Determined Contributions (2015) in relation to the Paris Agreement, 11th Malaysia Plan (2015) and Biennial Update Report to the UNFCCC (2015) will be discussed. These documents will be assessed for the presence of CPI based on the language/drafting of the documents as well as the degree of subject matter regarding CPI expressed in the documents. Based on the analysis, the researcher will propose solutions on how to improve Malaysia’s climate change and energy governance. The theory of reflexive governance will be applied to CPI. The concluding remarks will be about whether CPI reflects reflexive governance by demonstrating how the governance process can be the object of shaping outcomes.Keywords: climate policy integration, mainstreaming, policy coherence, Malaysian energy governance
Procedia PDF Downloads 1988711 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township
Authors: Edwin Mwasakidzeni Mutyenyoka
Abstract:
Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.Keywords: south-south migration, crises, social protection, Covid-19 pandemic
Procedia PDF Downloads 91