Search results for: border security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3026

Search results for: border security

896 An Application for Risk of Crime Prediction Using Machine Learning

Authors: Luis Fonseca, Filipe Cabral Pinto, Susana Sargento

Abstract:

The increase of the world population, especially in large urban centers, has resulted in new challenges particularly with the control and optimization of public safety. Thus, in the present work, a solution is proposed for the prediction of criminal occurrences in a city based on historical data of incidents and demographic information. The entire research and implementation will be presented start with the data collection from its original source, the treatment and transformations applied to them, choice and the evaluation and implementation of the Machine Learning model up to the application layer. Classification models will be implemented to predict criminal risk for a given time interval and location. Machine Learning algorithms such as Random Forest, Neural Networks, K-Nearest Neighbors and Logistic Regression will be used to predict occurrences, and their performance will be compared according to the data processing and transformation used. The results show that the use of Machine Learning techniques helps to anticipate criminal occurrences, which contributed to the reinforcement of public security. Finally, the models were implemented on a platform that will provide an API to enable other entities to make requests for predictions in real-time. An application will also be presented where it is possible to show criminal predictions visually.

Keywords: crime prediction, machine learning, public safety, smart city

Procedia PDF Downloads 93
895 Disaster Risk Reduction (DRR) through Harvesting Encosternum delegorguei Insect (Harurwa) in Nerumedzo, Bikita District, Zimbabwe

Authors: Mkhokheli Sithole, Brenda N. Muchapondwa

Abstract:

Food security is becoming a critical issue for people residing mainly in the rural areas where frequent droughts interrupt food production, reduce income, compromise the ability to save and erode livelihoods. This tends to increase the vulnerability of poor households to food and income insecurity, hence, malnutrition. There is an emerging need for DRR strategies to complement the existing rain fed crop production based livelihoods. One of such strategies employed by the community of Nerumedzo in Bikita district is the harvesting of Encosternum delegorguei insect. This article analyses the livelihood impacts of Encosternum delegorguei insect as a DRR strategy. The research used a combination of qualitative and quantitative approaches. The insect samples were tested in the laboratory for their nutritional composition while surveys were done on a sample of 40 community members. Participatory observations and 5 focus group discussions were also done. The results revealed that harvesting the Encosternum delegorguei insects provides a livelihood for the locals by complementing crop production thereby mitigating potential negative effects of frequent droughts. The insects are now a significant source of income to poor households in the community.

Keywords: disaster risk reduction, livelihoods, human, social sciences

Procedia PDF Downloads 183
894 South Asia as an Emerging Region of the World in the 21st Century

Authors: Shazia Shinwari

Abstract:

In the 21st century, South Asia is becoming one of the rising sub-regions of the world. In the whole of Asia, South Asia is going to be the center part of opportunities, development, and challenges. The increasing economy and its geopolitical importance are changing the landscape of South Asia. Despite intensifying the opportunities and development, the region is also facing the challenges of security, poverty, and conflicts. It is one of the most populated sub-regions and has many internal conflicts because of which the region remains for a long time a least developed region in the world. But now South Asia is transforming into the developing process and trying to utilize its potentials and to remove the hurdles in the way of development. South Asia is one of the distinctive regions of the world and could play an important role at the global level if the potentials of the region are properly utilized. South Asia is one of the most important regions of the world and assumed more importance after the British withdrawal from the region. Now South Asia is playing an important role in world politics due to its strategic and geographical location. That is why the importance of this region in the international political systems cannot be ignored. Day by day, changes have been taking place in the structure of the global economy, and South Asia could take advantage of these changes to advance as an economic region. For this, South Asia will need to look at its history, and that changes, particularly in the India and Pakistan relations, are necessary for the development of the South Asian region. Despite having challenges in the region, South Asia is also rising as the land of opportunities and development if the potentials of the region are properly utilized and smoothen the way for regional integration.

Keywords: challenges, development, opportunities, South Asia

Procedia PDF Downloads 175
893 Progress, Challenges, and Prospects of Non-Conventional Feed Resources for Livestock Production in Sub-Saharan Africa: A Review

Authors: Clyde Haruzivi, Olusegun Oyebade Ikusika, Thando Conference Mpendulo

Abstract:

Feed scarcity, increasing demand for animal products due to the growing human population, competition for conventional feed resources for humans and animal production, and ever-increasing prices of these feed resources are major constraints to the livestock industry in Sub-Saharan Africa. As a result, the industry is suffering immensely as the cost of production is high, hence the reduced returns. Most affected are the communal and resource-limited farmers who cannot afford the cost of conventional feed resources to supplement feeds, especially in arid and semi-arid areas where the available feed resources are not adequate for maintenance and production. This has tasked researchers and animal scientists to focus on the potential of non-conventional feed resources (NCFRs). Non-conventional feed resources could fill the gap through reduced competition, cost of feed, increased supply, increased profits, and independency as farmers will be utilizing locally available feed resources. Identifying available non-conventional feed resources is vital as it creates possibilities for novel feed industries and markets and implements methods of using these feedstuffs to improve livestock production and livelihoods in Sub-Saharan Africa. Hence, this research work analyses the progress, challenges, and prospects of some non-conventional feed resources in Sub-Saharan Africa.

Keywords: non-conventional, feed resources, livestock production, food security, Sub-Saharan

Procedia PDF Downloads 85
892 Divergent Preferences for Rice Variety Attributes among Farmers and Breeders in Nepal

Authors: Bibek Sapkota, Michael Burton, Krishna Prasad Timsina

Abstract:

This paper presents a discrete choice experiment (DCE)-based analysis of farmers' preferences for rice variety attributes involving 540 farmers from the Terai region of Nepal clustered into East, Mid, and Western Terai regions. Findings reveal that farmers prioritize grain yield, finer grain types, drought tolerance, and shorter crop duration when selecting rice varieties, with subtle gender-based differences observed. However, breeding programs have predominantly emphasized grain yield and crop duration, possibly neglecting other vital traits. Furthermore, the research reveals a concerning decline in the yield trends of both released and registered rice varieties. Notably, the limited availability of recommended rainfed varieties, despite strong farmer preferences for drought tolerance, underscores the imperative of bridging this gap to ensure food security. This study provides insights into the multifaceted nature of farmer preferences and calls for a more holistic approach to varietal development that aligns with farmers' needs and the evolving challenges of rice farming in the Terai region of Nepal.

Keywords: breeders’ preferences, discrete choice experiment, farmers’ preferences, rice variety attributes

Procedia PDF Downloads 111
891 Vision of Justice in the Future of Humanity

Authors: Morteza Khorrami

Abstract:

The idea of final triumph of peace and justice on evil force, conflict and global spread of the religious faith, the full deployment of human values, constitute a utopia and the ideal society is discussed by many of religions. Thus, mankind has always been waiting for a savior and has received good tidings for coming of Great Savior at the end of Time. Of course, various persons were introduced as the Promised Saviors by different religions, but all of the religions share in this fact that the future of humanity is very bright and promising and the future will belong to the righteous and justice. In this article which is written with a descriptive and analytic method, the author tries to show the vision of global justice at the end of time. The opinion of various religions such as Judaism, Christianity, Zoroastrianism, Islam and even idolatry about the great savior as well as the justice status in his era in the world will be discussed. Also the viewpoint of Muslims and specially Shiites, which is explained clearly in their scripts, will be depicted. Current human responsibility towards this golden era will be discussed, too. Based on paper findings, religious doctrine promises that a heaven person and sacred character will come as a reformer of the world. In his era, humanity will be saved from tyranny, oppression and inequality, and the earth will be filled with peace, security, justice, and equity. Moreover promoting justice, truth and spreading religion in the world, economic, scientific, political and moral development will be happened.

Keywords: future of humanity, global justice, islam, religions

Procedia PDF Downloads 353
890 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 107
889 When Helping Hurts: Addressing Violence in Healthcare Settings

Authors: Jason Maffia, Maria D’urso, Robert Crupi, Margaret Cartmell

Abstract:

The emotional aspects of traumatic events such as workplace violence are often ignored, causing low productivity, disillusionment, and resentment within an organization. As a result, if workplace violence, particularly in healthcare settings, is not adequately addressed, it will become a phenomenon, undermining the peace and stability among the active communities while also posing a risk to the population's health and well-being. This review intends to identify the risk factors and the implications of workplace violence in healthcare settings and highlight the collaborative efforts needed in sustaining control and prevention measures against workplace violence. It is essential that health care organizations are prepared physically and emotionally for traumatic situations. This study explores the theoretical nature of addressing work-related violence in healthcare settings as well as traumatic stress reactivity and the context within which reactions occur and recovery takes place. Cognitive, social, and organizational influences on response are identified and used to tentatively offer explanations for identifying security risks, development, and implementation of de-escalation teams, CISM programs and training staff in violence prevention are among strategies hospitals are employing to keep workers and patients safe. General conclusion regarding the implications for intervention effectiveness and design are discussed.

Keywords: healthcare settings, stress reactions, traumatic events, workplace violence

Procedia PDF Downloads 61
888 Solar Photovoltaic System (PV) Usages on Residential Houses in the Absheron Peninsula Region of the Republic of Azerbaijan: Obstacles and Opportunities

Authors: Elnur Abbasov

Abstract:

Energy security and climate change comprise some of the most important concerns facing humankind today and probably in the future if they are not addressed appropriately. In order to stabilize the global climate, there is the need for the world to lessen its use of fossil energy, which requires enhancement of current energy efficiency as well as the development of novel energy sources, such as energy obtained from renewable sources. There is no doubt that the steady transition towards a solar-based economy is likely to result in the development of completely new sectors, behaviours, and jobs that are pro-environmental. Azerbaijan Republic as the largest nation state in the South Caucasus Region has the potential for using and developing the renewable sources of energy in order to support the environmental challenge resolution associated with the climate change, improving the environmental situation in the country. Solar PV comprises one of the direct usages of solar energy. In this paper, sustainable PV usage scenario in residential houses was introduced to reduce negative environmental effects of land use, water consumption, air pollution etc. It was recommended by an author that, PV systems can be part of function and design of residential building components: such as roofs, walls, windows.

Keywords: energy efficiency, environmentally friendly, photovoltaic engineering, sustainable energy usage scenario

Procedia PDF Downloads 229
887 Study of the Influence of Eccentricity Due to Configuration and Materials on Seismic Response of a Typical Building

Authors: A. Latif Karimi, M. K. Shrimali

Abstract:

Seismic design is a critical stage in the process of design and construction of a building. It includes strategies for designing earthquake-resistant buildings to ensure health, safety, and security of the building occupants and assets. Hence, it becomes very important to understand the behavior of structural members precisely, for construction of buildings that can yield a better response to seismic forces. This paper investigates the behavior of a typical structure when subjected to ground motion. The corresponding mode shapes and modal frequencies are studied to interpret the response of an actual structure using different fabricated models and 3D visual models. In this study, three different structural configurations are subjected to horizontal ground motion, and the effect of “stiffness eccentricity” and placement of infill walls are checked to determine how each parameter contributes in a building’s response to dynamic forces. The deformation data from lab experiments and the analysis on SAP2000 software are reviewed to obtain the results. This study revealed that seismic response in a building can be improved by introducing higher deformation capacity in the building. Also, proper design of infill walls and maintaining a symmetrical configuration in a building are the key factors in building stability during the earthquake.

Keywords: eccentricity, seismic response, mode shape, building configuration, building dynamics

Procedia PDF Downloads 182
886 Loan Repayment Prediction Using Machine Learning: Model Development, Django Web Integration and Cloud Deployment

Authors: Seun Mayowa Sunday

Abstract:

Loan prediction is one of the most significant and recognised fields of research in the banking, insurance, and the financial security industries. Some prediction systems on the market include the construction of static software. However, due to the fact that static software only operates with strictly regulated rules, they cannot aid customers beyond these limitations. Application of many machine learning (ML) techniques are required for loan prediction. Four separate machine learning models, random forest (RF), decision tree (DT), k-nearest neighbour (KNN), and logistic regression, are used to create the loan prediction model. Using the anaconda navigator and the required machine learning (ML) libraries, models are created and evaluated using the appropriate measuring metrics. From the finding, the random forest performs with the highest accuracy of 80.17% which was later implemented into the Django framework. For real-time testing, the web application is deployed on the Alibabacloud which is among the top 4 biggest cloud computing provider. Hence, to the best of our knowledge, this research will serve as the first academic paper which combines the model development and the Django framework, with the deployment into the Alibaba cloud computing application.

Keywords: k-nearest neighbor, random forest, logistic regression, decision tree, django, cloud computing, alibaba cloud

Procedia PDF Downloads 112
885 Microbial Diversity Assessment in Household Point-of-Use Water Sources Using Spectroscopic Approach

Authors: Syahidah N. Zulkifli, Herlina A. Rahim, Nurul A. M. Subha

Abstract:

Sustaining water quality is critical in order to avoid any harmful health consequences for end-user consumers. The detection of microbial impurities at the household level is the foundation of water security. Water quality is now monitored only at water utilities or infrastructure, such as water treatment facilities or reservoirs. This research provides a first-hand scientific understanding of microbial composition presence in Malaysia’s household point-of-use (POUs) water supply influenced by seasonal fluctuations, standstill periods, and flow dynamics by using the NIR-Raman spectroscopic technique. According to the findings, 20% of water samples were contaminated by pathogenic bacteria, which are Legionella and Salmonella cells. A comparison of the spectra reveals significant signature peaks (420 cm⁻¹ to 1800 cm⁻¹), including species-specific bands. This demonstrates the importance of regularly monitoring POUs water quality to provide a safe and clean water supply to homeowners. Conventional Raman spectroscopy, up-to-date, is no longer suited for real-time monitoring. Therefore, this study introduced an alternative micro-spectrometer to give a rapid and sustainable way of monitoring POUs water quality. Assessing microbiological threats in water supply becomes more reliable and efficient by leveraging IoT protocol.

Keywords: microbial contaminants, water quality, water monitoring, Raman spectroscopy

Procedia PDF Downloads 86
884 Energy Efficiency Retrofitting of Residential Buildings Case Study: Multi-Family Apartment Building in Tripoli, Lebanon

Authors: Yathreb Sabsaby

Abstract:

Energy efficiency retrofitting of existing buildings was long ignored by public authorities who favored energy efficiency policies in new buildings, which are easier to implement. Indeed, retrofitting is more complex and difficult to organize because of the extreme diversity in existing buildings, administrative situations and occupation. Energy efficiency retrofitting of existing buildings has now become indispensable in all economies—even emerging countries—given the constraints imposed by energy security and climate change, and because it represents considerable potential energy savings. Addressing energy efficiency in the existing building stock has been acknowledged as one of the most critical yet challenging aspects of reducing our environmental footprint on the ecosystem. Tripoli, Lebanon chosen as case study area is a typical Mediterranean metropolis in the North Lebanon, where multifamily residential buildings are all around the city. This generally implies that the density of energy demand is extremely high, even the renewable energy facilities are involved, they can just play as a minor energy provider at the current technology level in the single family house. It seems only the low energy design for buildings can be made possible, not the zero energy certainly in developing country. This study reviews the latest research and experience and provides recommendations for deep energy retrofits that aim to save more than 50% of the energy used in a typical Tripoli apartment building.

Keywords: energy-efficiency, existing building, multifamily residential building, retrofit

Procedia PDF Downloads 438
883 Artificial Intelligence Impact on the Australian Government Public Sector

Authors: Jessica Ho

Abstract:

AI has helped government, businesses and industries transform the way they do things. AI is used in automating tasks to improve decision-making and efficiency. AI is embedded in sensors and used in automation to help save time and eliminate human errors in repetitive tasks. Today, we saw the growth in AI using the collection of vast amounts of data to forecast with greater accuracy, inform decision-making, adapt to changing market conditions and offer more personalised service based on consumer habits and preferences. Government around the world share the opportunity to leverage these disruptive technologies to improve productivity while reducing costs. In addition, these intelligent solutions can also help streamline government processes to deliver more seamless and intuitive user experiences for employees and citizens. This is a critical challenge for NSW Government as we are unable to determine the risk that is brought by the unprecedented pace of adoption of AI solutions in government. Government agencies must ensure that their use of AI complies with relevant laws and regulatory requirements, including those related to data privacy and security. Furthermore, there will always be ethical concerns surrounding the use of AI, such as the potential for bias, intellectual property rights and its impact on job security. Within NSW’s public sector, agencies are already testing AI for crowd control, infrastructure management, fraud compliance, public safety, transport, and police surveillance. Citizens are also attracted to the ease of use and accessibility of AI solutions without requiring specialised technical skills. This increased accessibility also comes with balancing a higher risk and exposure to the health and safety of citizens. On the other side, public agencies struggle with keeping up with this pace while minimising risks, but the low entry cost and open-source nature of generative AI led to a rapid increase in the development of AI powered apps organically – “There is an AI for That” in Government. Other challenges include the fact that there appeared to be no legislative provisions that expressly authorise the NSW Government to use an AI to make decision. On the global stage, there were too many actors in the regulatory space, and a sovereign response is needed to minimise multiplicity and regulatory burden. Therefore, traditional corporate risk and governance framework and regulation and legislation frameworks will need to be evaluated for AI unique challenges due to their rapidly evolving nature, ethical considerations, and heightened regulatory scrutiny impacting the safety of consumers and increased risks for Government. Creating an effective, efficient NSW Government’s governance regime, adapted to the range of different approaches to the applications of AI, is not a mere matter of overcoming technical challenges. Technologies have a wide range of social effects on our surroundings and behaviours. There is compelling evidence to show that Australia's sustained social and economic advancement depends on AI's ability to spur economic growth, boost productivity, and address a wide range of societal and political issues. AI may also inflict significant damage. If such harm is not addressed, the public's confidence in this kind of innovation will be weakened. This paper suggests several AI regulatory approaches for consideration that is forward-looking and agile while simultaneously fostering innovation and human rights. The anticipated outcome is to ensure that NSW Government matches the rising levels of innovation in AI technologies with the appropriate and balanced innovation in AI governance.

Keywords: artificial inteligence, machine learning, rules, governance, government

Procedia PDF Downloads 51
882 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 19
881 Smart Demand Response: A South African Pragmatic, Non-Destructive and Alternative Advanced Metering Infrastructure-Based Maximum Demand Reduction Methodology

Authors: Christo Nicholls

Abstract:

The National Electricity Grid (NEG) in South Africa has been under strain for the last five years. This overburden of the NEG led Eskom (the State-Owned Entity responsible for the NEG) to implement a blunt methodology to assist them in reducing the maximum demand (MD) on the NEG, when required, called Loadshedding. The challenge of this methodology is that not only does it lead to immense technical issues with the distribution network equipment, e.g., transformers, due to the frequent abrupt off and on switching, it also has a broader negative fiscal impact on the distributors, as their key consumers (commercial & industrial) are now grid defecting due to the lack of Electricity Security Provision (ESP). This paper provides a pragmatic alternative methodology utilizing specific functionalities embedded within direct-connect single and three-phase Advanced Meter Infrastructure (AMI) Solutions deployed within the distribution network, in conjunction with a Multi-Agent Systems Based AI implementation focused on Automated Negotiation Peer-2-Peer trading. The results of this research clearly illustrate, not only does methodology provide a factual percentage contribution towards the NEG MD at the point of consideration, it also allows the distributor to leverage the real-time MD data from key consumers to activate complex, yet impact-measurable Demand Response (DR) programs.

Keywords: AI, AMI, demand response, multi-agent

Procedia PDF Downloads 96
880 Examining the Challenges Faced by Passengers Using Arik Air for International and Domestic Travel

Authors: Mahmud Hafsat Hussaini, Eldah Ephraim Eldah, Bata Zoakah Amina

Abstract:

This research work was aimed at examining the challenges faced by passengers using Arik air for domestic and international travels. Passengers do complain of delay flights, theft and rude behavior by Arik staff while on transit or in the process of travelling using the aircraft. Being the national carrier in Nigeria these behaviors have tarnished the image of the airline and makes travel experience to be challenging. Hundred survey questionnaires were administered to travellers who have used the airline for domestic and international flights. Findings show that the staff of the airline do lack customer care skills and are sometimes rude to customers. The airline does have different agents that book for international flights who delays confirming bookings even after payment. The website of the airline is mostly down and makes bookings difficult. Other findings related to the study are a delay of domestic flights within Nigeria. Passengers are sometimes kept for 8 hours in the airport due to delay of flights. The study, therefore, recommends that flight schedule should be adhered to and staff should be trained to meet of with passengers demand. The security of guest luggage at the airport should be put in place to avoid theft. An effective booking platform should be accessible to passengers for easy booking.

Keywords: examining, challenges, domestic, international, travels

Procedia PDF Downloads 196
879 Degradation of Chlorpyrifos Pesticide in Aqueous Solution and Chemical Oxygen Demand from Real Effluent with Hydrodynamic Cavitation Approach

Authors: Shrikant Randhavane, Anjali Khambete

Abstract:

Use of Pesticides is vital in attaining food security and protection from harmful pests and insects in living environment. Chlorpyrifos, an organophosphate pesticide is widely used worldwide for various purposes. Due to its wide use and applications, its residues are found in environmental matrices and persist in nature for long duration of time. This has an adverse effect on human, aquatic and living bodies. Use of different methodologies is need of an hour to treat such type of recalcitrant compound. The paper focuses on Hydrodynamic Cavitation (HC), a hybrid Advanced Oxidation Potential (AOP) method to degrade Chlorpyrifos in aqueous water. Obtained results show that optimum inlet pressure of 5 bars gave maximum degradation of 99.25% for lower concentration and 87.14% for higher concentration Chlorpyrifos solution in 1 hour treatment time. Also, with known initial concentrations, comparing treatment time with optimum pressure of 5 bars, degradation efficiency increases with Hydrodynamic Cavitation. The potential application of HC in removal of Chemical Oxygen Demand (COD) from real effluent with venturi as cavitating device reveals around 40% COD removal with 1 hour of treatment time.

Keywords: advanced oxidation potential, cavitation, chlorpyrifos, COD

Procedia PDF Downloads 203
878 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 505
877 Islam, Forced Marriages and Pakistani Culture: An Analytical Overview

Authors: Naseem Akhter, Rozina Khattak, Arshad Munir

Abstract:

The Islamic social and family system is very clear concerning will, choice, consent and negation of compulsion and force in human life. Marriage is not only a civil contract but also a religious and spiritual contract between spouse (man and woman), which allows them for each other to live gladly, joyfully and legally in the society. It is an immortal and perpetual association between man and woman, which is filled with sympathetic affection, kindness, compassion and security. Islam gives specific rights to parents and guardians to set up the marriage ceremony and get done it as a respectful family occasion, confer their blessing and advice for a life partner of their children. The rights of parents and guardians are summed up in the term of "Willayah”. Islam does not permit parents, guardians and other relatives to compel their children regarding the marriage of their choice, because the groom and the bride are the real parties of the contract. Therefore, their willingness is of prime importance in order to spend whole life with each other. The Holy Prophet (peace and blessings of Allah be upon him) prohibits forcing a virgin to marriage without her permission, whether this is her father or someone else. The right of free consent to choose a life partner is the basic right for the human which is God (Allah) gifted. Unfortunately, forced marriage is a common practice in Pakistani society that has no link with Islam. This article is being written in the same context.

Keywords: choice, consent, forced marriage, Islam, parents, spouse

Procedia PDF Downloads 300
876 Vocational and Technical Education: A Practical Approach to Reducing Insecurity in Nigeria

Authors: S. S. Amoor

Abstract:

Insecurity is becoming a major tool in the hand of Nigeria’s enemies to increase poverty and hatred among the citizens and split the county into several political segments. It is based on this background that this paper critically examines Vocational and Technical Education as a practical and realistic approach to reducing insecurity in Nigeria so as to save the country from total disintegration. The paper discusses the concept of insecurity, types, causes and effects of insecurity, and how vocational and technical education and its variables are fundamental and practical measures to reducing insecurity in Nigeria. The paper concludes that the large army of unemployed and unskilled youths in Nigeria requires immediate attention in the area of provision of marketable vocational and technical skills, creativity and competences that will prepare them for employment or self-reliance. It is hoped that government jobs or self-employment will keep the teeming youths busy and therefore take their minds away from odd jobs that threaten the security of the country. In line with these, the paper recommends, among others, that since the teeming unemployed and unskilled youths are mostly from the rural areas, the state governments in collaboration with the local governments should take appropriate steps to provide the youths with vocational skills in carpentry, fashion designing, hair-dressing, driving, welding, mechanical works, among others. Once the youths are involved in one skilled trade or the other, insecurity would be reduced.

Keywords: vocational and technical education, insecurity, practical approach to reducing insecurity, unemployment

Procedia PDF Downloads 112
875 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 239
874 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 94
873 Outbound Tourism in Developed Countries: Analysis of the Trends, Behavior and the Transformation of the Moroccan Demand for International Travels

Authors: M. Boukhrouk, R. Ed-Dali

Abstract:

Outbound tourism in Morocco, as in the majority of developing countries, reveals some of the aspects of inequality between the north and the south. Considered by some researchers as one of the facets of the development crisis, access to tourism and especially international tourism is a chance for a small minority with financial means, while the vast portions of the population dream rather of immigrating to a developed country for the sake of improving their standard of living. The right to travel is also limited by visa requirements, procedures in host countries, security and technical measures and creates discrimination in the practice of tourism. These conditions do not seem to be favorable to the democratization of the practice of international tourism for the populations of the southern countries. This paper is a contribution to the reading of the trends of outbound tourism in developing countries through the example of Morocco. It highlights the different aspects of Moroccan outbound tourism, destinations and the behavior of tourists through an analysis of the offer of a sample of 50 travel agencies. In the same vein, it offers a reading grid of the possibilities offered for the development of outbound tourism and the various existing obstacles to the democratization of international outbound tourism in the southern countries. This reading reveals the transformation in the behavior of Moroccan international tourists as well as the profound changes in Moroccan society, through a model of statistical analysis.

Keywords: demand, Hajj, Morocco, outbound tourism, tendency, Umrah

Procedia PDF Downloads 159
872 Development of Lodging Business Management Standards of Bang Khonthi Community in Samut Songkram Province

Authors: Poramet Saeng-On

Abstract:

This research aims to develop ways of lodging business management of Bang Khonthi community in Samut Songkram province that are appropriate with the cultural context of the Bang Khonthi community. Eight lodging business owners were interviewed. It was found that lodging business that are family business must be done with passion, correct understanding of self, culture, nature, Thai way of life, thorough, professional development, environmentally concerned, building partnerships with various networks both community level, and public sector and business cohorts. Public relations should be done through media both traditional and modern outlets, such as websites and social networks to provide customers convenience, security, happiness, knowledge, love and value when travel to Bang Khonthi. This will also help them achieve sustainability in business, in line with the 10 Home Stay Standard Thailand. Suggestions for operators are as follows: Operators need to improve their public relations work. They need to use technology in public relations such as the internet. Management standards must be improved. Souvenir and local products shops should be arranged in the compound. Product pricing must be set accordingly. They need to join hands to help each other. Quality of the business operation should be raised to meet the standards. Educational measures to reduce the impact caused by tourism on the community such as efforts to reduce energy consumption.

Keywords: homestay, lodging business, management, standard

Procedia PDF Downloads 425
871 RSU Aggregated Message Delivery for VANET

Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana

Abstract:

V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.

Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation

Procedia PDF Downloads 388
870 Predicting Long-Term Meat Productivity for the Kingdom of Saudi Arabia

Authors: Ahsan Abdullah, Ahmed A. S. Bakshwain

Abstract:

Livestock is one of the fastest-growing sectors in agriculture. If carefully managed, have potential opportunities for economic growth, food sovereignty and food security. In this study we mainly analyse and compare long-term i.e. for year 2030 climate variability impact on predicted productivity of meat i.e. beef, mutton and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i) climatic-change vulnerability ii) CO2 fertilization and iii) water scarcity and compare the results with two countries of the region i.e. Iraq and Yemen. We do the analysis using data from diverse sources, which was extracted, transformed and integrated before usage. The collective impact of the three factors had an overall negative effect on the production of meat for all the three countries, with adverse impact on Iraq. High similarity was found between CO2 fertilization (effecting animal fodder) and water scarcity i.e. higher than that between production of beef and mutton for the three countries considered. Overall, the three factors do not seem to be favorable for the three Middle-East countries considered. This points to possibility of a vegetarian year 2030 based on dependency on indigenous live-stock population.

Keywords: prediction, animal-source foods, pastures, CO2 fertilization, climatic-change vulnerability, water scarcity

Procedia PDF Downloads 301
869 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario

Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis

Abstract:

With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.

Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain

Procedia PDF Downloads 154
868 Creative Art Practice in Response to Climate Change: How Art Transforms and Frames New Approaches to Speculative Ecological and Sustainable Futures

Authors: Wenwen Liu, Robert Burton, Simon McKeown

Abstract:

Climate change is seriously threatening human security and development, leading to global warming and economic, political, and social chaos. Many artists have created visual responses that challenge perceptions on climate change, actively guiding people to think about the climate issues and potential crises after urban industrialization and explore positive solutions. This project is an interdisciplinary and intertextual study where art practice is informed by culture, philosophy, psychology, ecology, and science. By correlating theory and artistic practice, it studies how art practice creates a new way of understanding climate issues and uses art as a way of exploring speculative futures. In the context of practical-based research, arts-based practice as research and creative practice as interdisciplinary research are applied alternately to seek the original solution and new knowledge. Through creative art practice, this project has established new visual ways of looking at climate change and has developed it into a new model to generate more possibilities, an alternative social imagination. It not only encourages people to think and find a sustainable speculative future conducive to all species but also proves that people have the ability to realize positive futures.

Keywords: climate change, creative practice as interdisciplinary research, arts-based practice as research, creative art practice, speculative future

Procedia PDF Downloads 257
867 The Impact of Human Rights on Society and Legislations

Authors: Eid Nasr Saad Nasr

Abstract:

Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 40