Search results for: authorized agencies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 787

Search results for: authorized agencies

667 Road Accidents in Urban and Rural Areas in Dar Es Salaam, Tanzania

Authors: Bruno Kinyaga

Abstract:

Motorcycles transport commonly known as (Boda boda) in Tanzania has been growing up in the recent years in both urban and rural areas. Since motorcycles have been authorized to carry passengers in Tanzania they have been associated with many accidents resulting in large number of deaths and injuries in the country. Most of the road traffic injury victims are passengers, motorcyclists and pedestrians. Males are over represented in all cases. Most of the deceased were 18-29 years old. The increase of motorcycles has been accompanied with the increase of motorcycle crashes causing deaths and injuries to passengers as well as riders. According to the data collected, the statistics shows that from January to December 2015, the total number of 4079 motorcycles was involved in accidents in the country, causing 1747 deaths and 4826 injuries. Compares to the report of January to December 2014 whereby the total number of motorcycles involved in accidents were 3710, causing 1423 deaths and 3622 injuries. This is according to the report provided by the Road safety Chief Commander in Tanzania.

Keywords: accidents, road, safety, Tanzania

Procedia PDF Downloads 167
666 A Cloud-Based Mobile Auditing Tools for Muslim-Friendly Hospitality Services

Authors: Mohd Iskandar Illyas Tan, Zuhra Junaida Mohamad Husny, Farawahida Mohd Yusof

Abstract:

The potentials of Muslim-friendly hospitality services bring huge opportunities to operators (hoteliers, tourist guides, and travel agents), especially among the Muslim countries. In order to provide guidelines that facilitate the operations among these operators, standards and manuals have been developing by the authorities. Among the challenges is the applicability and complexity of the standard to be adopted in the real world. Mobile digital technology can be implemented to overcome those challenges. A prototype has been developed to help operators and authorities to assess their readiness in complying with MS2610:2015. This study analyzes the of mobile digital technology characteristics that are suitable for the user in conducting sharia’ compliant hospitality audit. A focus group study was conducted in the state of Penang, Malaysia that involves operators (hoteliers, tourist guide, and travel agents) as well as agencies (Islamic Tourism Center, Penang Islamic Affairs Department, Malaysian Standard) that involved directly in the implementation of the certification. Both groups were given the 3 weeks to test and provide feedback on the usability of the mobile applications in order to conduct an audit on their readiness towards the Muslim-friendly hospitality services standard developed by the Malaysian Standard. The feedbacks were analyzed and the overall results show that three criteria (ease of use, completeness and fast to complete) show the highest responses among both groups for the mobile application. This study provides the evidence that the mobile application development has huge potentials to be implemented by the Muslim-friendly hospitality services operator and agencies.

Keywords: hospitality, innovation, audit, compliance, mobile application

Procedia PDF Downloads 133
665 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 121
664 Collaborative Environmental Management: A Case Study Research of Stakeholders' Collaboration in the Nigerian Oil-Producing Region

Authors: Favour Makuochukwu Orji, Yingkui Zhao

Abstract:

A myriad of environmental issues face the Nigerian industrial region, resulting from; oil and gas production, mining, manufacturing and domestic wastes. Amidst these, much effort has been directed by stakeholders in the Nigerian oil producing regions, because of the impacts of the region on the wider Nigerian economy. Research to date has suggested that collaborative environmental management could be an effective approach in managing environmental issues; but little attention has been given to the roles and practices of stakeholders in effecting a collaborative environmental management framework for the Nigerian oil-producing region. This paper produces a framework to expand and deepen knowledge relating to stakeholders aspects of collaborative roles in managing environmental issues in the Nigeria oil-producing region. The knowledge is derived from analysis of stakeholders’ practices – studied through multiple case studies using document analysis. Selected documents of key stakeholders – Nigerian government agencies, multi-national oil companies and host communities, were analyzed. Open and selective coding was employed manually during document analysis of data collected from the offices and websites of the stakeholders. The findings showed that the stakeholders have a range of roles, practices, interests, drivers and barriers regarding their collaborative roles in managing environmental issues. While they have interests for efficient resource use, compliance to standards, sharing of responsibilities, generating of new solutions, and shared objectives; there is evidence of major barriers which includes resource allocation, disjointed policy and regulation, ineffective monitoring, diverse socio- economic interests, lack of stakeholders’ commitment and limited knowledge sharing. However, host communities hold deep concerns over the collaborative roles of stakeholders for economic interests, particularly, where government agencies and multi-national oil companies are involved. With these barriers and concerns, a genuine stakeholders’ collaboration is found to be limited, and as a result, optimal environmental management practices and policies have not been successfully implemented in the Nigeria oil-producing region. A framework is produced that describes practices that characterize collaborative environmental management might be employed to satisfy the stakeholders’ interests. The framework recommends critical factors, based on the findings, which may guide a collaborative environmental management in the oil producing regions. The recommendations are designed to re-define the practices of stakeholders in managing environmental issues in the oil producing regions, not as something wholly new, but as an approach essential for implementing a sustainable environmental policy. This research outcome may clarify areas for future research as well as to contribute to industry guidance in the area of collaborative environmental management.

Keywords: collaborative environmental management framework, case studies, document analysis, multinational oil companies, Nigerian oil producing regions, Nigerian government agencies, stakeholders analysis

Procedia PDF Downloads 174
663 Improved Regression Relations Between Different Magnitude Types and the Moment Magnitude in the Western Balkan Earthquake Catalogue

Authors: Anila Xhahysa, Migena Ceyhan, Neki Kuka, Klajdi Qoshi, Damiano Koxhaj

Abstract:

The seismic event catalog has been updated in the framework of a bilateral project supported by the Central European Investment Fund and with the extensive support of Global Earthquake Model Foundation to update Albania's national seismic hazard model. The earthquake catalogue prepared within this project covers the Western Balkan area limited by 38.0° - 48°N, 12.5° - 24.5°E and includes 41,806 earthquakes that occurred in the region between 510 BC and 2022. Since the moment magnitude characterizes the earthquake size accurately and the selected ground motion prediction equations for the seismic hazard assessment employ this scale, it was chosen as the uniform magnitude scale for the catalogue. Therefore, proxy values of moment magnitude had to be obtained by using new magnitude conversion equations between the local and other magnitude types to this unified scale. The Global Centroid Moment Tensor Catalogue was considered the most authoritative for moderate to large earthquakes for moment magnitude reports; hence it was used as a reference for calibrating other sources. The best fit was observed when compared to some regional agencies, whereas, with reports of moment magnitudes from Italy, Greece and Turkey, differences were observed in all magnitude ranges. For teleseismic magnitudes, to account for the non-linearity of the relationships, we used the exponential model for the derivation of the regression equations. The obtained regressions for the surface wave magnitude and short-period body-wave magnitude show considerable differences with Global Earthquake Model regression curves, especially for low magnitude ranges. Moreover, a conversion relation was obtained between the local magnitude of Albania and the corresponding moment magnitude as reported by the global and regional agencies. As errors were present in both variables, the Deming regression was used.

Keywords: regression, seismic catalogue, local magnitude, tele-seismic magnitude, moment magnitude

Procedia PDF Downloads 70
662 Adaptation of Smart City Concept in Africa: Localization, Relevance and Bottleneck

Authors: Adeleye Johnson Adelagunayeja

Abstract:

The concept of making cities, communities, and neighborhoods smart, intelligent, and responsive is relatively new to Africa and its urban renewal agencies. Efforts must be made by relevant agencies to begin a holistic review of the implementation of infrastructural facilities and urban renewal methodologies that will revolve around the appreciation and application of artificial intelligence. The propagation of the ideals and benefits of the smart city concept are key factors that can encourage governments of African nations, the African Union, and other regional organizations in Africa to embrace the ideology. The ability of this smart city concept to curb insecurities – armed robbery, assassination, terrorism, and civil disorder – is one major reason, amongst others, why African governments must speedily embrace this contemporary developmental concept whose time has come! The seamlessness to access information and virtually cross-pollinate ideas with people living in already established smart cities, when combined with the great efficiency that the emergence of smart cities brings with it, are other reasons why Africa must come up with action plans that can enable the existing cities to metamorphose into smart cities. Innovations will be required to enable Africa to develop a smart city concept that will be compatible with the basic patterns of livelihood because the essence of the smart city evolution is to make life better for people to co-exist, to be productive and to enjoy standard infrastructural facilities. This research paper enumerates the multifaceted adaptive factors that have the potentials of making the adoption of smartcity concept in Africa seamless. It also proffers solutions to potential bottlenecks capable of undermining the execution of the smart city concept in Africa.

Keywords: smartcity compactibility innovation Africa government evolution, Africa as global village member, evolution in Africa, ways to make Africa adopt smartcity, localizing smartcity concept in Africa, bottleneck to smartcity developmet in Africa

Procedia PDF Downloads 85
661 A Study on Vulnerability of Alahsa Governorate to Generate Urban Heat Islands

Authors: Ilham S. M. Elsayed

Abstract:

The purpose of this study is to investigate Alahsa Governorate status and its vulnerability to generate urban heat islands. Alahsa Governorate is a famous oasis in the Arabic Peninsula including several oil centers. Extensive literature review was done to collect previous relative data on the urban heat island of Alahsa Governorate. Data used for the purpose of this research were collected from authorized bodies who control weather station networks over Alahsa Governorate, Eastern Province, Saudi Arabia. Although, the number of weather station networks within the region is very limited and the analysis using GIS software and its techniques is difficult and limited, the data analyzed confirm an increase in temperature for more than 2 °C from 2004 to 2014. Such increase is considerable whenever human health and comfort are the concern. The increase of temperature within one decade confirms the availability of urban heat islands. The study concludes that, Alahsa Governorate is vulnerable to create urban heat islands and more attention should be drawn to strategic planning of the governorate that is developing with a high pace and considerable increasing levels of urbanization.

Keywords: Alahsa Governorate, population density, Urban Heat Island, weather station

Procedia PDF Downloads 250
660 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 256
659 Overview of E-government Adoption and Implementation in Ghana

Authors: Isaac Kofi Mensah

Abstract:

E-government has been adopted and used by many governments/countries around the world including Ghana to provide citizens and businesses with more accurate, real-time, and high quality services and information. The objective of this paper is to present an overview of the Government of Ghana’s (GoG) adoption and implement of e-government and its usage by the Ministries, Departments and its agencies (MDAs) as well as other public sector institutions to deliver efficient public service to the general public i.e. citizens, business etc. Government implementation of e-government focused on facilitating effective delivery of government service to the public and ultimately to provide efficient government-wide electronic means of sharing information and knowledge through a network infrastructure developed to connect all major towns and cities, Ministries, Departments and Agencies and other public sector organizations in Ghana. One aim for the Government of Ghana use of ICT in public administration is to improve productivity in government administration and service by facilitating the exchange of information to enable better interaction and coordination of work among MDAs, citizens and private businesses. The study was prepared using secondary sources of data from government policy documents, national and international published reports, journal articles, and web sources. This study indicates that through the e-government initiative, currently citizens and businesses can access and pay for services such as renewal of driving license, business registration, payment of taxes, acquisition of marriage and birth certificates as well as application for passport through the GoG electronic service (eservice) and electronic payment (epay) portal. Further, this study shows that there is an enormous commitment from GoG to adopt and implement e-government as a tool not only to transform the business of government but also to bring efficiency in public services delivered by the MDAs. To ascertain this, a further study need to be carried out to determine if the use of e-government has brought about the anticipated improvements and efficiency in service delivery of MDAs and other state institutions in Ghana.

Keywords: electronic government, electronic services, electronic pay, MDAs

Procedia PDF Downloads 512
658 Enforcement against Illegal Logging: Issues and Challenges

Authors: Muhammad Nur Haniff Mohd Noor, Rokiah Kadir, Suriyani Muhamad

Abstract:

Sustainable forest management and forest protection can be hampered by illegal logging. Illegal logging is not uncommon in many wood-producing countries. Hence, law enforcement, especially in timber-producing countries, is crucial in ensuring compliance with forestry related regulations, as well as confirming that all parties obey the rules and regulations prescribed by the authorities. However, enforcement officers are encountering various challenges and difficulties which have undermined the enforcement capacity and efficiency. The appropriate policy responses for these issues are important to resolve the problems in the long term and empowering enforcement capacity to meet future challenges of forest law enforcement. This paper is written according to extensive review of the articles and publications by The International Criminal Police Organization (INTERPOL), The International Tropical Timber Organization (ITTO), Chatham House and The Food and Agriculture Organization of the United Nations (FAO). Subsequently, various books and journal articles are reviewed to gain further insight towards enforcement issues and challenges. This paper identifies several issues which consist of (1) insufficient enforcement capacity and resources (2) lack of coordination between various enforcement agencies, (3) corruption in the government and private sectors and (4) unclear legal frameworks related to the forestry sector. Next, this paper discusses appropriate policy responses to address each enforcement challenges according to various publications. This includes specific reports concerning forest law enforcement published by international forestry-related organizations. Therefore, lack of resources, inadequate synchronization between agencies, corruption, and legal issues present challenges to enforcement officers in their daily routines. Recommendations regarding proper policy responses to overcome the issues are of great importance in assisting forest authorities in prioritizing their resources appropriately.

Keywords: corruption, enforcement challenges, enforcement capacity, forest law enforcement, insufficient agency coordination, legislative ambiguity

Procedia PDF Downloads 187
657 Current Situation of Maritime Transport and Logistics in Myanmar

Authors: S. N. S. Thein, H. L. Yang, Z. B. Liu

Abstract:

There are many modes of transport. Among them, maritime transport is a major transportation mode of international trade. In the Republic of the Union of Myanmar (Burma), water transportation served as one of the most important modes of transport for country's exports and imports. Getting the accurate information and data-gathering activity are the most important aspects for any study field. Therefore, in this research, a historical review of the development of ports in Myanmar and how they have changed had been carried out. All the relevant literature and documents have also been reviewed, studied, and organized. The sources of collected data are from reports, journals, internet, as well as from the publications of authorized organizations and international associations. To get better understanding about real situation of maritime transport and logistics in Myanmar; current condition of existing ports, expansion and on-going projects, and future port development plans are described successively. Hence, the main purpose of this study is to build up a comprehensive picture of maritime transport and logistics, in addition to border trade within ASEAN and Myanmar. It will help for academic researchers, decision makers, and stakeholders for national planning as well as for the local and foreign investors to recognize current situation of maritime transport and logistics in Myanmar.

Keywords: ASEAN, border trade, logistics, maritime transport, ports of Myanmar

Procedia PDF Downloads 219
656 Feasibility Study on Developing and Enhancing of Flood Forecasting and Warning Systems in Thailand

Authors: Sitarrine Thongpussawal, Dasarath Jayasuriya, Thanaroj Woraratprasert, Sakawtree Prajamwong

Abstract:

Thailand grapples with recurrent floods causing substantial repercussions on its economy, society, and environment. In 2021, the economic toll of these floods amounted to an estimated 53,282 million baht, primarily impacting the agricultural sector. The existing flood monitoring system in Thailand suffers from inaccuracies and insufficient information, resulting in delayed warnings and ineffective communication to the public. The Office of the National Water Resources (OWNR) is tasked with developing and integrating data and information systems for efficient water resources management, yet faces challenges in monitoring accuracy, forecasting, and timely warnings. This study endeavors to evaluate the viability of enhancing Thailand's Flood Forecasting and Warning (FFW) systems. Additionally, it aims to formulate a comprehensive work package grounded in international best practices to enhance the country's FFW systems. Employing qualitative research methodologies, the study conducted in-depth interviews and focus groups with pertinent agencies. Data analysis involved techniques like note-taking and document analysis. The study substantiates the feasibility of developing and enhancing FFW systems in Thailand. Implementation of international best practices can augment the precision of flood forecasting and warning systems, empowering local agencies and residents in high-risk areas to prepare proactively, thereby minimizing the adverse impact of floods on lives and property. This research underscores that Thailand can feasibly advance its FFW systems by adopting international best practices, enhancing accuracy, and improving preparedness. Consequently, the study enriches the theoretical understanding of flood forecasting and warning systems and furnishes valuable recommendations for their enhancement in Thailand.

Keywords: flooding, forecasting, warning, monitoring, communication, Thailand

Procedia PDF Downloads 61
655 Comparative Analysis of Patent Protection between Health System and Enterprises in Shanghai, China

Authors: Na Li, Yunwei Zhang, Yuhong Niu

Abstract:

The study discussed the patent protections of health system and enterprises in Shanghai. The comparisons of technical distribution and scopes of patent protections between Shanghai health system and enterprises were used by the methods of IPC classification, co-words analysis and visual social network. Results reflected a decreasing order within IPC A61 area, namely A61B, A61K, A61M, and A61F. A61B required to be further investigated. The highest authorized patents A61B17 of A61B of IPC A61 area was found. Within A61B17, fracture fixation, ligament reconstruction, cardiac surgery, and biopsy detection were regarded as common concerned fields by Shanghai health system and enterprises. However, compared with cardiac closure which Shanghai enterprises paid attention to, Shanghai health system was more inclined to blockages and hemostatic tools. The results also revealed that the scopes of patent protections of Shanghai enterprises were relatively centralized. Shanghai enterprises had a series of comprehensive strategies for protecting core patents. In contrast, Shanghai health system was considered to be lack of strategic patent protections for core patents.

Keywords: co-words analysis, IPC classification, patent protection, technical distribution

Procedia PDF Downloads 134
654 The Use and Safety of Leave from an Acute Inpatient Psychiatry Unit: A Retrospective Review of Pass Outcomes Over Four Years Abstract

Authors: Vasilis C. Hristidis, Ricardo Caceda, Ji Soo Kim, Brian Bronson, Emily A. Hill

Abstract:

Objective: Leave passes to provide authorized leave for hospitalized patients from a psychiatric inpatient unit. Though providing day passes was once a relatively common practice, there is relatively little data describing their safety and efficacy. Methods: This descriptive study examines the use of leave passes in an adult inpatient unit at a university hospital between 2017 and 2021, with attention to reasons for granting the day pass, duration, and outcome of the pass. Results: During the study period, ten patients with primary psychotic or mood disorders received 12 passes for either housing coordination, COVID-19 vaccination, or major family events. There were no fatalities or elopements. One patient experienced severe agitation and engaged in non-suicidal self-injurious behavior. A second patient showed mild, redirectable psychomotor agitation upon return to the unit. The remaining 10 passes were uneventful. Conclusions: Our findings support the view that patients with diverse diagnoses can safely be provided leave from an inpatient setting with adequate planning and support, yielding a low incidence of adverse events.

Keywords: passes, inpatient, psychiatry, inpatient leave, outcome

Procedia PDF Downloads 199
653 The Approach to Develop Value Chain to Enhance the Management Efficiency of Thai Tour Operators in Order to Support Free Trade within the Framework of ASEAN Cooperation

Authors: Yalisa Tonsorn

Abstract:

The objectives of this study are 1) to study the readiness of Thai tour operators in order to prepare for being ASEAN members, 2) to study opportunity and obstacles of the management of Thai tour operators, and 3) to find approach for developing value chain in order to enhance the management efficiency of Thai tour operators in order to support free trade within the framework of ASEAN cooperation. The research methodology is mixed between qualitative method and quantitative method. In-depth interview was done with key informants, including management supervisors, medium managers, and officers of the travel agencies. The questionnaire was conducted with 300 sampling. According to the study, it was found that the approach for developing value chain to enhance the management efficiency of Thai travel agencies in order to support free trade within the framework of ASEAN cooperation, the tour operators must give priority to the customer and deliver the service exceeding the customer’s expectation. There are 2 groups of customers: 1) external customers referring to tourist, and 2) internal customers referring to staff who deliver the service to the customers, including supervisors, colleagues, or subordinates. There are 2 issues which need to be developed: 1) human resource development in order to cultivate the working concept by focusing on importance of customers, and excellent service providing, and 2) working system development by building value and innovation in operational process including services to the company in order to deliver the highest impressive service to both internal and external customers. Moreover, the tour operators could support the increased number of tourists significantly. This could enhance the capacity of the business and affect the increase of competition capability in the economic dimension of the country.

Keywords: AEC (ASEAN Economic Eommunity), core activities, support activities, values chain

Procedia PDF Downloads 352
652 Strategic Policy Formulation to Ensure the Atlantic Forest Regeneration

Authors: Ramon F. B. da Silva, Mateus Batistella, Emilio Moran

Abstract:

Although the existence of two Forest Transition (FT) pathways, the economic development and the forest scarcity, there are many contexts that shape the model of FT observed in each particular region. This means that local conditions, such as relief, soil quality, historic land use/cover, public policies, the engagement of society in compliance with legal regulations, and the action of enforcement agencies, represent dimensions which combined, creates contexts that enable forest regeneration. From this perspective we can understand the regeneration process of native vegetation cover in the Paraíba Valley (Forest Atlantic biome), ongoing since the 1960s. This research analyzed public information, land use/cover maps, environmental public policies, and interviewed 17 stakeholders from the Federal and State agencies, municipal environmental and agricultural departments, civil society, farmers, aiming comprehend the contexts behind the forest regeneration in the Paraíba Valley, Sao Paulo State, Brazil. The first policy to protect forest vegetation was the Forest Code n0 4771 of 1965, but this legislation did not promote the increase of forest, just the control of deforestation, not enough to the Atlantic Forest biome that reached its highest pick of degradation in 1985 (8% of Atlantic Forest remnants). We concluded that the Brazilian environmental legislation acted in a strategic way to promote the increase of forest cover (102% of regeneration between 1985 and 2011) from 1993 when the Federal Decree n0 750 declared the initial and advanced stages of secondary succession protected against any kind of exploitation or degradation ensuring the forest regeneration process. The strategic policy formulation was also observed in the Sao Paulo State law n0 6171 of 1988 that prohibited the use of fire to manage agricultural landscape, triggering a process of forest regeneration in formerly pasture areas.

Keywords: forest transition, land abandonment, law enforcement, rural economic crisis

Procedia PDF Downloads 553
651 Grassroots Innovation for Greening Bangladesh's Urban Slums: The Role of Local Agencies

Authors: Razia Sultana

Abstract:

The chapter investigates the roles of local Non-Governmental Organisations (NGOs) and Community Based Organisations (CBOs) in climate change adaptation through grassroots innovation in urban slums in Dhaka, Bangladesh. The section highlights green infrastructure as an innovative process to mitigate the challenges emanating from climate change at the bottom of the pyramid. The research draws on semi-structured in-depth interviews with 11 NGOs and 2 CBOs working in various slums in Dhaka. The study explores the activities of local agencies relating to urban green infrastructure (UGI) and its possible mitigation of a range of climate change impacts: thermal discomfort, heat stress, flooding and the urban heat island. The main argument of the chapter is unlike the Global North stakeholders’ activities relating to UGI in cities of the Global South have not been expanded on a large scale. Moreover, UGI as a risk management strategy is underutilised in the developing countries. The study finds that, in the context of Bangladesh, climate change adaptation through green infrastructure in cities is still nascent for local NGOs and CBOs. Mostly their activities are limited to addressing the basic needs of slum communities such as water and sanitation. Hence urban slum dwellers have been one of the most vulnerable groups in that they are deprived of the city’s basic ecological services. NGOs are utilizing UGI in an innovative way despite various problems in slums. For instance, land scarcity and land insecurity in slums are two key areas where UGI faces resistance. There are limited instances of NGOs using local and indigenous techniques to encourage slum dwellers to adopt UGI for creating sustainable environments. It is in this context that the paper is an attempt to showcase some of the grassroots innovation that NGOs are currently adopting in slums. Also, some challenges and opportunities are discussed to address UGI as a strategy for climate change adaptation in slums.

Keywords: climate change adaptation, green infrastructure, Dhaka, slums, NGOs

Procedia PDF Downloads 153
650 Fact-checking and Political Polarization in an Emerging Democracy

Authors: Eric Agyekum, Dominic Asitanga

Abstract:

Ghana is widely considered asa beacon of democracy in sub-Saharan Africa. With a relatively free media, the country was ranked30thin the world and third in Africaon the 2021 Press Freedom Index. Despite the democratic gains, itis one of the most politically polarized nations in the world. Ghana’spolitical division is evident in the current hunglegislature, where each of the two dominant political parties has 137 members, with an independent member occupying the remaining one seat. Misinformation and fake newsthrive in systems with acuteideological and political differences(Imelda et al, 2021; Azzimonti&Fernandes, 2018; Spohr, 2017) and Ghana is no exception. The information disorder problem has been exacerbatedby the COVID-19 pandemic, with its attendant conspiracy theories and speculations, making it difficult for the media and fact-checking organizations to verifyall claims and flag false information. In Ghana, fact-checking agencies like Ghana Fact, Dubawa Ghana, and some mainstream news media organizations have been fact-checking political claims, COVID-19 conspiracy theories, and many others. However, it is not clear if the audience consumeand attach prominence to these fact-checked stories or even visit the websites of the fact-checking agencies to read the content. Nekmat (2020) opine that though the literature on fact-checking suggest that fact-checked stories can alter readers’ beliefs, very few studies have investigated the patronage and the potential of fact-checks to deter users from sharing false news with others, particularly on social media. In response to Nekmat, this study has been initiated to examine the perception and attitude of the audience in Ghana towards fact-checks. Anchored on the principles of the nudge theory, this study will investigate how fact-checked stories alters readers’ behavioural patterns. A survey will be conducted to collect data from sampled members of the Ghanaian society.

Keywords: fact-checking, information disorder, nudge theory, political polarization

Procedia PDF Downloads 142
649 The Discriminate Analysis and Relevant Model for Mapping Export Potential

Authors: Jana Gutierez Chvalkovska, Michal Mejstrik, Matej Urban

Abstract:

There are pending discussions over the mapping of country export potential in order to refocus export strategy of firms and its evidence-based promotion by the Export Credit Agencies (ECAs) and other permitted vehicles of governments. In this paper we develop our version of an applied model that offers “stepwise” elimination of unattractive markets. We modify and calibrate the model for the particular features of the Czech Republic and specific pilot cases where we apply an individual approach to each sector.

Keywords: export strategy, modeling export, calibration, export promotion

Procedia PDF Downloads 498
648 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 393
647 Health Monitoring of Primates in a Conservation Unit in Brazil

Authors: Elisângela de Albuquerque Sobreira Borovoski, Ricardo Willian Borovoski

Abstract:

Microbiological infections acquired by animals pose a risk to public health. In public health, monitoring the health of primates is linked to the risk of transmission of zoonoses through scratches, bites and contact with biological samples. The project was approved by the Ethics Committee on the Use of Animals Protocol No. 170/2019. It was authorized by ICMBio Protocol No. 52117-1. The study was carried out in the period 2019-2022 in the municipality of Anápolis. Iron and galvanized wire traps were used and the animals were anesthetized with 4.4mg/kg zolethyl intramuscularly and saliva was collected through swabs. Fifty-three capuchin monkeys were captured from the Onofre Quinan Environmental Park in Anápolis-Goiás for health monitoring purposes. In the laboratory, the samples were deposited on the agar surface and seeded by exhaustion to obtain isolated colonies. These colonies were analyzed according to morphocolonial characteristics. Morphometric characterization and biochemical tests for bacterial identification were performed. A total of 861 bacterial samples were isolated, nine of which were strict anaerobic bacteria of the genus Peptostreptococcus. Previous and constant knowledge of the prevalence of pathogenic agents in biological samples is essential to be prepared to act in pandemic situations.

Keywords: Brazil, microbiology, monkeys, public health

Procedia PDF Downloads 76
646 Conditionality of Aid as a Counterproductive Factor in Peacebuilding in the Afghan Context

Authors: Karimova Sitora Yuldashevna

Abstract:

The August 2021 resurgence of Taliban as a ruling force in Afghanistan once again challenged the global community into dealing with an unprecedentedly unlike-minded government. To express their disapproval of the new regime, Western governments and intergovernmental institutions have suspended their infrastructural projects and other forms of support. Moreover, the Afghan offshore reserves were frozen, and Afghanistan was disconnected from the international financial system, which impeded even independent aid agencies’ work. The already poor provision of aid was then further complicated with political conditionality. The purpose of this paper is to investigate the efficacy of conditional aid policy in the Afghan peacebuilding under Taliban rule and provide recommendations to international donors on further course of action. Arguing that conditionality of aid is a counterproductive factor in the peacebuilding process, this paper employs scholarly literature on peacebuilding alongside reports from International non-governmental organizations INGOs who operate directly in Afghanistan. The existing debate on peacebuilding in Afghanistan revolves around aid as a means of building democratic foundation for achieving peace on communal and national levels and why the previous attempts to do so were unsuccessful. This paper focuses on how to recalibrate the approach to aid provision and peacebuilding in the new reality. In the early 2000s, amid the weak Post-Cold War international will for a profound engagement in the conflict, humanitarian and development aid became the new means of achieving peace. Aid agencies provided resources directly to communities, minimizing the risk of local disputes. Through subsidizing education, governance reforms, and infrastructural projects, international aid accelerated school enrollment, introduced peace education, funded provincial council and parliamentary elections, and helped rebuild a conflict-torn country.When the Taliban seized power, the international community called on them to build an inclusive government based on respect for human rights, particularly girls’ and women’s schooling and work, as a condition to retain the aid flow. As the Taliban clearly failed to meet the demands, development aid was withdrawn. Some key United Nation agencies also refrained from collaborating with the de-facto authorities. However, contrary to the intended change in Talibs’ behavior, such a move has only led to further deprivation of those whom the donors strived to protect. This is because concern for civilians has always been the second priority for the warring parties. This paper consists of four parts. First, it describes the scope of the humanitarian crisis that began in Afghanistan in 2001. Second, it examines the previous peacebuilding attempts undertaken by the international community and the contribution that the international aid had in the peacebuilding process. Third, the paper describes the current regime and its relationships with the international donors. Finally, the paper concludes with recommendations for donors who would have to be more realistic and reconsider their priorities. While it is certainly not suggested that the Taliban regime is legitimized internationally, the crisis calls upon donors to be more flexible in collaborating with the de-facto authorities for the sake of the civilians.

Keywords: Afghanistan, international aid, donors, peacebuilding

Procedia PDF Downloads 87
645 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 299
644 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 384
643 Graffiti as Intelligence: an Analysis of Encoded Messages in Gang Graffiti Renderings

Authors: Timothy Kephart

Abstract:

Many law enforcement officials believe that gangs communicate messages to both the community and to rival gangs through graffiti. Some social scientists have documented this as well, however no recent research has examined gang graffiti for its underlying meaning. Empirical research on gang graffiti and gang communication through graffiti is limited. This research can be described as an exploratory effort to better understand how, and perhaps why, gangs employ this medium for communication. Furthermore this research showcases how law enforcement agencies can utilize this hidden form of communication to better direct resources and impact gang violence.

Keywords: gangs, graffiti, juvenile justice, policing

Procedia PDF Downloads 439
642 Democratization, Market Liberalization and the Raise of Vested Interests and Its Impacts on Anti-Corruption Reform in Indonesia

Authors: Ahmad Khoirul Umam

Abstract:

This paper investigates the role of vested interests and its impacts on anti-corruption agenda in Indonesia following the collapse of authoritarian regime in 1998. A pervasive and rampant corruption has been believed as the main cause of the state economy’s fragility. Hence, anti-corruption measures were implemented by applying democratization and market liberalization since the establishment of a consolidated democracy which go hand in hand with a liberal market economy is convinced to be an efficacious prescription for effective anti-corruption. The reform movement has also mandated the establishment of the independent, neutral and professional special anti-corruption agency namely Corruption Eradication Commission (KPK) to more intensify the fight against the systemic corruption. This paper will examine whether these anti-corruption measures have been effective to combat corruption, and investigate to what extend have the anti-corruption efforts, especially those conducted by KPK, been impeded by the emergence of a nexus of vested interests as the side-effect of democratization and market liberalization. Based on interviews with key stakeholders from KPK, other law enforcement agencies, government, prominent scholars, journalists and NGOs in Indonesia, it is found that since the overthrow of Soeharto, anti-corruption movement in the country have become more active and serious. After gradually winning the hearth of people, KPK successfully touched the untouchable corruption perpetrators who were previously protected by political immunity, legal protection and bureaucratic barriers. However, these changes have not necessarily reduced systemic and structural corruption practices. Ironically, intensive and devastating counterattacks were frequently posed by the alignment of business actors, elites of political parties, government, and also law enforcement agencies by hijacking state’s instruments to make KPK deflated, powerless, and surrender. This paper concludes that attempts of democratization, market liberalization and the establishment of anti-corruption agency may have helped Indonesia to reduce corruption. However, it is still difficult to imply that such anti-corruption measures have fostered the more effective anti-corruption works in the newly democratized and weakly regulated liberal economic system.

Keywords: vested interests, democratization, market liberalization, anti-corruption, Indonesia

Procedia PDF Downloads 232
641 Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)

Authors: Ilija Musa

Abstract:

Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media.

Keywords: children, media, legislation, privacy protection, Bosnia Herzegovina

Procedia PDF Downloads 492
640 Public-Private Partnership for Better Protection of Trafficked Victims in Thailand: Case Study on Public Protection and Welfare Center in Cooperation with Jim Thompson Foundation in Occupational Development on Silk Sewing and Tailoring

Authors: Aungkana Kmonpetch

Abstract:

Protection of trafficked victims and partnership among stakeholders are established as core principles in 5P’ strategies in international and national anti-human trafficking policies. In this article, it is of interest to discuss how the role of public-private partnerships in promoting the occupation development for employment in wage will enhance the better protection for victims of trafficking who affirmatively decide they want a criminal justice intervention, using Thailand as a case. Most of the victims who have accepted to be witness in the criminal justice system have lost income during their absence from work. The analysis of Thailand case is based on two methodological approaches: 1) interview with victims of trafficking, protection authorities, service providers, trainers and teachers, social workers, NGOs, police, prosecutors, business owners and enterprises, ILO, UNDP etc.; 2) create collaborative effort through workshops/consultation meetings in participation of all stakeholders – governmental agencies, private organizations, UN and international agencies. The linking of protection and partnership is anchored in international conventions and human trafficking directives. While this is actually framed as a responsive advantage for 5P strategies of anti-human trafficking – prevention, protection, persecution, punishment, and partnership, in reality, there might have more practical requirements of care and support. The article addresses how the partnership between governmental agencies and private organizations provide opportunities for trafficked victims to engage in high-skilled occupational development such as Silk-Sewing and Tailoring. The discussion is also focused how this approach of capacity building of the trainer for trainee, be enable the trafficked victims to cultivate the practices of high-skilled training to engage them into the business of social enterprise with employment in wage. The partnership coordination draws specifically to two aspects: firstly, to formulate appropriate assistance for promotion and protection of human rights of the trafficked victims in response to the 5P’ strategies of anti-human trafficking policy; secondly, to empower them to settle some economic stability for livelihood opportunity in the country of origin on their return and reintegration. Therefore, they can define how they want to move forward to prevent them at risk of vulnerable situations where they might being trafficked again or going on to work in exploitative conditions. It strengthens proper access to protection and assistance, depending on how the incentive of protection for cooperation is perceived to be and how useful the capacity building in occupation development for employment in wage will be implemented practically both in the host country and in the country of origin. This also brings into question how the victim of trafficking are able to access to the trade of market and are supported the employment opportunity according to the concept of decent work as they are constituted as witnesses. We discuss these issues in the area of a broader literature on social protection, economic security, gender, law, and victimhood.

Keywords: employment opportunity, occupation development, protection for victim of trafficking, public-private partnership

Procedia PDF Downloads 228
639 Impact of Revenue Reform on Vulnerable Communities

Authors: Pauliasi Tony Fakahau

Abstract:

This paper provides an overview of the impact of the revenue reform programme on vulnerable communities in the Kingdom of Tonga. Economic turmoil and mismanagement during the late 1990s forced the government to seek technical and financial assistance from the Asian Development Bank to undertake a comprehensive Economic and Public Sector Reform (EPSR) programme. The EPSR is a Western model recommended by donor agencies as the solution to Tonga’s economic challenges. The EPSR programme included public sector reform, private sector growth, and revenue generation. Tax reform was the main tool for revenue generation, which set out to strengthen tax compliance and administration as well as implement a value-added consumption tax. The EPSR is based on Western values and ideology but failed to recognise that Tongan cultural values are important to the local community. Two participant groups were interviewed. Participant group one consisted of 51 people representing vulnerable communities. Participant group two consisted of six people from the government and business sector who were from the elite of Tongan society. The Kakala Research Methodology provided the framework for the research, and the Talanoa Research Method was used to conduct semi-structured interviews in the homes of the first group and in the workplaces of the second group. The research found a heavy burden of the consumption tax on the purchasing power of participant group one (vulnerable participants), having an impact on nearly every financial transaction they made. Participant group ones’ main financial priorities were kavenga fakalotu (obligations to the church), kavenga fakafāmili (obligations to the family) and kavenga fakafonua (obligations to cultural events for the village, nobility, and royalty). The findings identified inequalities of the revenue reform, especially from consumption tax, for vulnerable people and communities compared to the elite of society. The research concluded that government and donor agencies need ameliorating policies to reduce the burden of tax on vulnerable groups more susceptible to the impact of revenue reform.

Keywords: tax reform, tonga vulnerable community revenue, revenue reform, public sector reform

Procedia PDF Downloads 128
638 Deep Learning Based Text to Image Synthesis for Accurate Facial Composites in Criminal Investigations

Authors: Zhao Gao, Eran Edirisinghe

Abstract:

The production of an accurate sketch of a suspect based on a verbal description obtained from a witness is an essential task for most criminal investigations. The criminal investigation system employs specifically trained professional artists to manually draw a facial image of the suspect according to the descriptions of an eyewitness for subsequent identification. Within the advancement of Deep Learning, Recurrent Neural Networks (RNN) have shown great promise in Natural Language Processing (NLP) tasks. Additionally, Generative Adversarial Networks (GAN) have also proven to be very effective in image generation. In this study, a trained GAN conditioned on textual features such as keywords automatically encoded from a verbal description of a human face using an RNN is used to generate photo-realistic facial images for criminal investigations. The intention of the proposed system is to map corresponding features into text generated from verbal descriptions. With this, it becomes possible to generate many reasonably accurate alternatives to which the witness can use to hopefully identify a suspect from. This reduces subjectivity in decision making both by the eyewitness and the artist while giving an opportunity for the witness to evaluate and reconsider decisions. Furthermore, the proposed approach benefits law enforcement agencies by reducing the time taken to physically draw each potential sketch, thus increasing response times and mitigating potentially malicious human intervention. With publically available 'CelebFaces Attributes Dataset' (CelebA) and additionally providing verbal description as training data, the proposed architecture is able to effectively produce facial structures from given text. Word Embeddings are learnt by applying the RNN architecture in order to perform semantic parsing, the output of which is fed into the GAN for synthesizing photo-realistic images. Rather than the grid search method, a metaheuristic search based on genetic algorithms is applied to evolve the network with the intent of achieving optimal hyperparameters in a fraction the time of a typical brute force approach. With the exception of the ‘CelebA’ training database, further novel test cases are supplied to the network for evaluation. Witness reports detailing criminals from Interpol or other law enforcement agencies are sampled on the network. Using the descriptions provided, samples are generated and compared with the ground truth images of a criminal in order to calculate the similarities. Two factors are used for performance evaluation: The Structural Similarity Index (SSIM) and the Peak Signal-to-Noise Ratio (PSNR). A high percentile output from this performance matrix should attribute to demonstrating the accuracy, in hope of proving that the proposed approach can be an effective tool for law enforcement agencies. The proposed approach to criminal facial image generation has potential to increase the ratio of criminal cases that can be ultimately resolved using eyewitness information gathering.

Keywords: RNN, GAN, NLP, facial composition, criminal investigation

Procedia PDF Downloads 162