Search results for: AVL security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2798

Search results for: AVL security

608 Participatory Democracy to the Contemporary Problems of Polish Social Policy

Authors: Agnieszka Szczudlińska-Kanoś

Abstract:

Nowadays the participation of citizens in public life increasingly effect on management at all levels of public authority. Today, however, democratic systems in many countries, also in Poland, based on the first - on the institutions of representative democracy, which is mainly on elections, party activity, on the other hand - on the basic instruments of direct democracy, which, in particular, we can include a referendum or initiative of citizenship - although these are often rather complementary. Other forms of participatory democracy, such as deliberative democracy, participatory budgeting, public consultation in practice in many countries are still rare. Appropriate use of the potential invested in participatory democracy can bring enormous and multilateral benefits. On the one hand, local and regional communities taking an active part in public life express their needs, point out problems and thus affect the decisions of public authorities. Authorities using knowledge acquired from the citizens also implement the policy tailored to their needs, thus obtaining support in the next election. The purpose of this study is to show how the Polish citizens affect to resolve issues of social policy pursued at different levels of government. This problem is very important because today the observed changes seen in virtually all fields of life create new social problems, which nowadays are no longer only the problems of the region, the country but they are international, global issues. From such this perspective we should talk about them, discuss, try to solve at all levels. Article will be useful not only theorists involved in the management of the public, local government, or social but also practitioners - local government acting as their functions at different levels of government. Conclusions drawn from the publication will also be useful to politicians and those directly affecting for: functioning social security systems, the scope and quality of public services and the overall shape of the contemporary social policy in different countries.

Keywords: social policy, local government, social participation, social services

Procedia PDF Downloads 287
607 Compensation for Victims of Crime and Abuse of Power in Nigeria

Authors: Kolawole Oyekan Jamiu

Abstract:

In Nigerian criminal law, a victim of an offence plays little or no role in the prosecution of an offender. The state concentrates only on imposing punishment on the offender while the victims of crime and abuse of power by security agencies are abandoned without any compensation either from the State or the offender. It has been stated that the victim of crime is the forgotten man in our criminal justice system. He sets the criminal law in motion but then goes into oblivion. Our present criminal law does not recognise the right of the victim to take part in the prosecution of the case or his right to compensation. The victim is merely a witness in a state versus case. This paper examines the meaning of the phrase ‘the victims of crime and abuse of power’. It needs to be noted that there is no definition of these two categories of victims in any statute in Nigeria. The paper also considers the United Nations General Assembly Declaration of Basic Principle of Justice for Victims and abuse of power. This declaration was adopted by the United Nations General Assembly on the 25th of November 1985. The declaration contains copious provisions on compensation for the victims of crime and abuse of power. Unfortunately, the declaration is not, in itself a legally binding instrument and has been given little or no attention since the coming into effect in1985. This paper examines the role of the judiciary in ensuring that victims of crime and abuse of power in Nigeria are compensated. While some Judges found it difficult to award damages to victims of abuse of power others have given some landmark rulings and awarded substantial damages. The criminal justice ( victim’s remedies) Bill shall also be examined. The Bill comprises of 74 sections and it spelt out the procedures for compensating the victims of crime and abuse of power in Nigeria. Finally, the paper also examines the practicability of awarding damages to victims of crime whether the offender is convicted or not and in addition, the possibility of granting all equitable remedies available in civil cases to victims of crime and abuse of power so that the victims will be restored to the earlier position before the crime.

Keywords: compensation, damages, restitution, victims

Procedia PDF Downloads 727
606 Non-Invasive Data Extraction from Machine Display Units Using Video Analytics

Authors: Ravneet Kaur, Joydeep Acharya, Sudhanshu Gaur

Abstract:

Artificial Intelligence (AI) has the potential to transform manufacturing by improving shop floor processes such as production, maintenance and quality. However, industrial datasets are notoriously difficult to extract in a real-time, streaming fashion thus, negating potential AI benefits. The main example is some specialized industrial controllers that are operated by custom software which complicates the process of connecting them to an Information Technology (IT) based data acquisition network. Security concerns may also limit direct physical access to these controllers for data acquisition. To connect the Operational Technology (OT) data stored in these controllers to an AI application in a secure, reliable and available way, we propose a novel Industrial IoT (IIoT) solution in this paper. In this solution, we demonstrate how video cameras can be installed in a factory shop floor to continuously obtain images of the controller HMIs. We propose image pre-processing to segment the HMI into regions of streaming data and regions of fixed meta-data. We then evaluate the performance of multiple Optical Character Recognition (OCR) technologies such as Tesseract and Google vision to recognize the streaming data and test it for typical factory HMIs and realistic lighting conditions. Finally, we use the meta-data to match the OCR output with the temporal, domain-dependent context of the data to improve the accuracy of the output. Our IIoT solution enables reliable and efficient data extraction which will improve the performance of subsequent AI applications.

Keywords: human machine interface, industrial internet of things, internet of things, optical character recognition, video analytics

Procedia PDF Downloads 109
605 Adult Child Labour Migration and Elderly Parent Health: Recent Evidence from Indonesian Panel Data

Authors: Alfiah Hasanah, Silvia Mendolia, Oleg Yerokhin

Abstract:

This paper explores the impacts of adult child migration on the health of elderly parents left behind. The maternal and children health are a priority of health-related policy in most low and middle-income country, and so there is lack of evidence on the health of older population particularly in Indonesia. With increasing life expectancy and limited access to social security and social services for the elderly in this country, the consequences of increasing number of out-migration of adult children to parent health are important to investigate. This study use Indonesia Family Life Survey (IFLS), the only large-scale continuing longitudinal socioeconomic and health survey that based on a sample of households representing about 83 percent of the Indonesian population in its first wave. Using four waves of IFLS including the recent wave of 2014, several indicators of the self-rated health status, interviewer-rated health status and days of illness are used to estimate the impact of labour out-migration of adult children on parent health status. Incorporate both individual fixed effects to control for unobservable factors in migrant and non-migrant households and the ordered response of self-rated health, this study apply the ordered logit of “Blow-up and Cluster” (BUC ) estimator. The result shows that labour out-migration of adult children significantly improves the self-rated health status of the elderly parent left behind. Findings of this study are consistent with the view that migration increases family resources and contribute to better health care and nutrition of the family left behind.

Keywords: aging, migration, panel data, self-rated health

Procedia PDF Downloads 349
604 Building Safer Communities through Institutional Collaboration in Ghana: An Appraisal of Existing Arrangement

Authors: Louis Kusi Frimpong, Martin Oteng-Ababio

Abstract:

The problem of crime and insecurity in urban environments are often complex, multilayered, multidimensional and sometimes interwoven. It is from this perspective that recent approaches and strategies aimed at responding to crime and insecurity have looked at the problem from a social, economic, spatial and institutional point of view. In Ghana, there is much understanding of how various elements of the social and spatial setting influence crime and safety concerns of residents in urban areas. However, little research attention has been given to the institutional dimension of the problem of crime and insecurity in urban Ghana. In particular, scholars and policymakers in the area of safety and security have scarcely interrogated the forms of collaboration that exist between the various formal and informal institutions and how gaps and lapses in this collaboration influence vulnerability to crime and feelings of insecurity. Using Sekondi-Takoradi as a case study and drawing on both primary and secondary data, this paper assesses the activities of various institutions both formal and informal in crime control and prevention in the Sekondi-Takoradi metropolis, the third largest city in Ghana. More importantly, the paper seeks to address gaps in the institutional arrangement and coordination between and among institutions at the forefront of crime prevention efforts in the metropolis and by extension Ghanaian cities. The study found that whiles there is some form of collaboration between the police and the community, little collaboration existed between planning authorities and the police on the one hand, and the community on the other hand. The paper concludes that in light of the complex nature of a crime, institutional coordination and an inclusive approach involving formal and informal will be critical in promoting safer cities in Ghana.

Keywords: crime prevention, coordination, Ghana, institutional arrangement

Procedia PDF Downloads 125
603 YOLO-IR: Infrared Small Object Detection in High Noise Images

Authors: Yufeng Li, Yinan Ma, Jing Wu, Chengnian Long

Abstract:

Infrared object detection aims at separating small and dim target from clutter background and its capabilities extend beyond the limits of visible light, making it invaluable in a wide range of applications such as improving safety, security, efficiency, and functionality. However, existing methods are usually sensitive to the noise of the input infrared image, leading to a decrease in target detection accuracy and an increase in the false alarm rate in high-noise environments. To address this issue, an infrared small target detection algorithm called YOLO-IR is proposed in this paper to improve the robustness to high infrared noise. To address the problem that high noise significantly reduces the clarity and reliability of target features in infrared images, we design a soft-threshold coordinate attention mechanism to improve the model’s ability to extract target features and its robustness to noise. Since the noise may overwhelm the local details of the target, resulting in the loss of small target features during depth down-sampling, we propose a deep and shallow feature fusion neck to improve the detection accuracy. In addition, because the generalized Intersection over Union (IoU)-based loss functions may be sensitive to noise and lead to unstable training in high-noise environments, we introduce a Wasserstein-distance based loss function to improve the training of the model. The experimental results show that YOLO-IR achieves a 5.0% improvement in recall and a 6.6% improvement in F1-score over existing state-of-art model.

Keywords: infrared small target detection, high noise, robustness, soft-threshold coordinate attention, feature fusion

Procedia PDF Downloads 72
602 The Conception of Implementation of Vision for European Forensic Science 2020 in Lithuania

Authors: Eglė Bilevičiūtė, Vidmantas Egidijus Kurapka, Snieguolė Matulienė, Sigutė Stankevičiūtė

Abstract:

The Council of European Union (EU Council) has stressed on several occasions the need for a concerted, comprehensive and effective solution to delinquency problems in EU communities. In the context of establishing a European Forensic Science Area and the development of forensic science infrastructure in Europe, EU Council believes that forensic science can significantly contribute to the efficiency of law enforcement, crime prevention and combating crimes. Lithuanian scientists have consolidated to implement a project named “Conception of the vision for European Forensic Science 2020 implementation in Lithuania” (the project is funded for the period of 1 March 2014 - 31 December 2016) with the objective to create a conception of implementation of the vision for European Forensic Science 2020 in Lithuania by 1) evaluating the current status of Lithuania’s forensic system and opportunities for its improvement; 2) analysing achievements and knowledge in investigation of crimes listed in conclusions of EU Council on the vision for European Forensic Science 2020 including creation of a European Forensic Science Area and the development of forensic science infrastructure in Europe: trafficking in human beings, organised crime and terrorism; 3) analysing conceptions of criminalistics, which differ in different EU member states due to the variety of forensic schools, and finding means for their harmonization. Apart from the conception of implementation of the vision for European Forensic Science 2020 in Lithuania, the project is expected to suggest provisions that will be relevant to other EU countries as well. Consequently, the presented conception of implementation of vision for European Forensic Science 2020 in Lithuania could initiate a project for a common vision of European Forensic Science and contribute to the development of the EU as an area of freedom, security and justice. The article presents main ideas of the project of the conception of the vision for European Forensic Science 2020 of EU Council and analyses its legal background, as well as prospects of and challenges for its implementation in Lithuania and the EU.

Keywords: EUROVIFOR, standardization, vision for European Forensic Science 2020, Lithuania

Procedia PDF Downloads 407
601 Architectural Adaptation for Road Humps Detection in Adverse Light Scenario

Authors: Padmini S. Navalgund, Manasi Naik, Ujwala Patil

Abstract:

Road hump is a semi-cylindrical elevation on the road made across specific locations of the road. The vehicle needs to maneuver the hump by reducing the speed to avoid car damage and pass over the road hump safely. Road Humps on road surfaces, if identified in advance, help to maintain the security and stability of vehicles, especially in adverse visibility conditions, viz. night scenarios. We have proposed a deep learning architecture adaptation by implementing the MISH activation function and developing a new classification loss function called "Effective Focal Loss" for Indian road humps detection in adverse light scenarios. We captured images comprising of marked and unmarked road humps from two different types of cameras across South India to build a heterogeneous dataset. A heterogeneous dataset enabled the algorithm to train and improve the accuracy of detection. The images were pre-processed, annotated for two classes viz, marked hump and unmarked hump. The dataset from these images was used to train the single-stage object detection algorithm. We utilised an algorithm to synthetically generate reduced visible road humps scenarios. We observed that our proposed framework effectively detected the marked and unmarked hump in the images in clear and ad-verse light environments. This architectural adaptation sets up an option for early detection of Indian road humps in reduced visibility conditions, thereby enhancing the autonomous driving technology to handle a wider range of real-world scenarios.

Keywords: Indian road hump, reduced visibility condition, low light condition, adverse light condition, marked hump, unmarked hump, YOLOv9

Procedia PDF Downloads 23
600 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target

Authors: Lawan Ja’afar Tahir

Abstract:

This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.

Keywords: border, insecurity, weapons, management

Procedia PDF Downloads 68
599 3+3 Regional Cooperation Format and the South Caucasus

Authors: Eka Darbaidze

Abstract:

Due to its important geopolitical location and strategic economic situation, the South Caucasus has been a region that has been a crossroads of interests between different states and empires since ancient times. Over the centuries, the forms of international relations with regard to the South Caucasus region have been constantly changing, however, the national interests of the Caucasian nations as well as the interests of the regional hegemonic powers in relation to the countries of the South Caucasus have remained almost unchanged. The conflict-ridden South Caucasus's attempt to create a new format of regional cooperation has a rather rich history, dating back to the collapse of the Soviet Union. However, despite the diversity of initiatives, they do not deviate from the format of political statements and it is natural that the case was never settled before their implementation, as none of the previous cooperation initiatives was able to reach all members of the region. The current regional co-operation platform is linked to the name of Turkish President Recep Tayyip Erdogan, who spoke out about the initiative during a visit to Azerbaijan. The so-called 3 + 3 platform for regional cooperation involves cooperation between three countries in the South Caucasus (Armenia, Azerbaijan and Georgia) and three "big neighbors" - Russia, Turkey and Iran. Very soon, the initiative received a positive response from the authorities of Azerbaijan, Iran and Armenia. According to them, this cooperation platform will strengthen cooperation between the countries involved in the regional platform and will focus on security, economic and transport issues. Our goal is to determine the interests of the main regional actors involved in the South Caucasus Cooperation Platform (3 + 3): Iran, Russia and Turkey. Our goal is also to determine what threats, risks or benefits may be associated with the involvement of the three countries of the South Caucasus: Azerbaijan, Armenia and Georgia in this platform and what will be the consequences for Georgia, whose 20% of its internationally recognized borders are still occupied by Russia and whose territory is still under creeping occupation.

Keywords: South Caucasus, Georgia's interest, the interests of Iran, the interests of Turkey, Russian interests, Georgia's occupation

Procedia PDF Downloads 208
598 Study on the Situation between France and the South China Sea from the Perspective of Balance of Power Theory

Authors: Zhenyi Chen

Abstract:

With the rise of China and the escalation of tension between China and the United States, European countries led by Great Britain, France, and Germany pay increasing attention to the regional situation in the Asia-Pacific (now known as "Indo-Pacific"). Among them, the South China Sea (SCS) is one of the main areas disputed by China, the United States, Southeast Asian countries and some European countries. Western countries are worried that the rise of China's military power will break the stability of the situation in SCS and alter the balance of power among major powers. Therefore, they tried to balance China's rise through alliance. In France's Indo-Pacific strategy, France aims to build a regional order with the alliance of France, India and Australia as the core, and regularly carry out military exercises targeting SCS with the United States, Japan and Southeast Asian countries. For China, the instability of the situation in SCS could also threaten the security of the southeast coastal areas and Taiwan, affect China's peaceful development process, and pose a threat to China's territorial sovereignty. This paper aims to study the activities and motivation of France in the South China Sea, and put the situation in SCS under the perspective of Balance of Power Theory, focusing on China, America and France. To be more specific, this paper will first briefly introduce Balance of Power Theory, then describe the new trends of France in recent years, followed with the analysis on the motivation of the increasing trend of France's involvement in SCS, and finally analyze the situation in SCS from the perspective of "balance of power" theory. It will be argued that great powers are carefully maintaining the balance of military power in SCS, and it is highly possible that this trend would still last in the middle and long term, particularly via military deployment and strategic alliances.

Keywords: South China Sea, France, China, balance of power theory, Indo-Pacific

Procedia PDF Downloads 175
597 Comparative Study of Flood Plain Protection Zone Determination Methodologies in Colombia, Spain and Canada

Authors: P. Chang, C. Lopez, C. Burbano

Abstract:

Flood protection zones are riparian buffers that are formed to manage and mitigate the impact of flooding, and in turn, protect local populations. The purpose of this study was to evaluate the Guía Técnica de Criterios para el Acotamiento de las Rondas Hídricas in Colombia against international regulations in Canada and Spain, in order to determine its limitations and contribute to its improvement. The need to establish a specific corridor that allows for the dynamic development of a river is clear; however, limitations present in the Colombian Technical Guide are identified. The study shows that international regulations provide similar concepts as used in Colombia, but additionally integrate aspects such as regionalization that allows for a better characterization of the channel way, and incorporate the frequency of flooding and its probability of occurrence in the concept of risk when determining the protection zone. The case study analyzed in Dosquebradas - Risaralda aimed at comparing the application of the different standards through hydraulic modeling. It highlights that the current Colombian standard does not offer sufficient details in its implementation phase, which leads to a false sense of security related to inaccuracy and lack of data. Furthermore, the study demonstrates how the Colombian norm is ill-adapted to the conditions of Dosquebradas typical of the Andes region, both in the social and hydraulic aspects, and does not reduce the risk, nor does it improve the protection of the population. Our study considers it pertinent to include risk estimation as an integral part of the methodology when establishing protect flood zone, considering the particularity of water systems, as they are characterized by an heterogeneous natural dynamic behavior.

Keywords: environmental corridor, flood zone determination, hydraulic domain, legislation flood protection zone

Procedia PDF Downloads 113
596 Motherhood and Its Essence among Zimbabwean Migrant Women in Australia

Authors: Pranee Liamputtong

Abstract:

Childlessness in non-Western societies has wide-ranging social implications and profoundly affects the gender identity and well-being of women. The aspirations of women in these societies are shaped by various sociocultural expectations, encompassing social norms and their own social standing. Currently, there is limited knowledge regarding the perceptions and experiences of Zimbabwean migrant women living in Australia regarding childlessness and motherhood. This paper explores the cultural perspective on children in Zimbabwean society and investigates the personal and social consequences of infertility, as well as the cultural expectations of motherhood among Zimbabwean migrant women residing in Australia. The perceptions and experiences of this migrant community are of utmost importance in order to prevent misunderstandings about the core essence of motherhood among Zimbabwean women. Ultimately, this will lead to the provision of sensitive and culturally appropriate healthcare and social support for migrants in Australia's multicultural society. The study adopts a constructivist paradigm and employs qualitative methods, including in-depth interviews, drawings, and photo elicitation, involving 15 Zimbabwean women. Thematic analysis was employed to analyze the data. In Zimbabwean culture, the ability to bear a child holds significant meaning for women. Children not only ensure the continuity of society but also provide social security, as parents rely on their children for care in old age. Childlessness jeopardizes a woman's social status and carries social repercussions that have a profound impact on their gender identity and well-being. Cultural expectations of motherhood place the sole responsibility for the emotional and physical care of children on the mother. Despite residing in Australia, the procreative value has not diminished for Zimbabwean women. Raising awareness of the procreative needs of Zimbabwean women in a culturally sensitive manner would enhance the emotional well-being of these women.

Keywords: motherhood, culture, migrant women, Zimbabwe, Australia

Procedia PDF Downloads 87
595 Indonesian Food Safety Policy for Local Commodity against ASEAN Economic Community: An Uneven Battle in the Global War

Authors: Wahyu Riawanti

Abstract:

Food safety is the one of a prominent issue for globalization era. The more concern is paid in international food and agriculture trade; the more consumers will consider raising the standard of food safety. For this reason, the role of the issue is not only in term of added value but since then also the main requirement in import export activity, including agriculture products. Unfortunately, Indonesia and other developing countries found it difficult to fulfill some of the technical issues and end it up with the lower export activity. In this case, the technical requirements of food safety become an obstacle rather than challenging. Furthermore for local farmers’ activity, food safety is more or less a threat. The study is aimed to reveal on how Indonesian government had dealt with the certification regulation to face problem on competitiveness of Indonesian products. Local government has conducted the regulation of food certification. The study used the case of Salak Pondoh fruit (Salacca zalacca) certification process on Sleman District- Yogyakarta. Triangulation method was used to analyze the effectiveness of the certification program. The quantitative data series taken from 7 farmer groups during the certification processes were used for the research main data. The supporting qualitative data was obtained from in-depth interview with the members of farmers group. The pre-research result has shown that the impact varied from different groups. Conclusively the certification regulation has partly failed to make a significant change in local farmers’ competitiveness. Even the profit was increased, the highly amount budget of the program did not significantly increase the economic incentives for local farmers.

Keywords: economic incentive, food security, government regulation, international trade, local commodity, Salacca zalacca

Procedia PDF Downloads 276
594 Agroecology Techniques in Palestine

Authors: Rima Younis

Abstract:

Agro-ecology is considered one of the agricultural approaches that is spreading across the world due to the practical solutions it provides that are in harmony with nature. These solutions target many agricultural problems, food production issues, and climate change. Agriculture and fertile soil in particular, play a vital role when it comes to food security and climate change. The organic substances, which mainly consist of carbon, in the soil contribute to the ecological system through 4 elements: Resistance to soil erosion, conserving water in soil, increasing soil fertility, and improving the biodiversity in it. Any small changes to the carbon storage in soil have a tremendous impact on both agricultural productivity and the greenhouse gas cycle, which is what agro-ecology aims to achieve. The importance of agro-ecology lies here, as it helps increase organic matter/carbon in the soil, on an ongoing basis, 15-20 times higher than nature’s rate in producing organic matter. Agro-ecology is set to increase the production of crops free of chemicals, develop organic matter, and establish carbon in soil, thus being a factor in limiting climate change, not just mitigating or adapting. Under the events of the rapid increase in population and the need to feed humans, agro-ecology stands in the first place as it surpasses the productivity of chemical agriculture per unit area, according to international and local experience. The introduction of agro-ecology to Palestine started 15 years ago, with modest beginnings faced with a lot of criticism and opposition, but is currently experiencing rapid growth among farmers and is becoming accepted among specialists. Even though the number of agro-ecologist farmers is still small, it reflects a state of turnover into a more sustainable, less polluting agriculture that works on renewing life and the elements of nature.

Keywords: toward to solidarity economy, food sovereignty, the introduction of agro-ecology to Palestine, the importance of agro-ecology

Procedia PDF Downloads 25
593 The Feasibility Evaluation Of The Compressed Air Energy Storage System In The Porous Media Reservoir

Authors: Ming-Hong Chen

Abstract:

In the study, the mechanical and financial feasibility for the compressed air energy storage (CAES) system in the porous media reservoir in Taiwan is evaluated. In 2035, Taiwan aims to install 16.7 GW of wind power and 40 GW of photovoltaic (PV) capacity. However, renewable energy sources often generate more electricity than needed, particularly during winter. Consequently, Taiwan requires long-term, large-scale energy storage systems to ensure the security and stability of its power grid. Currently, the primary large-scale energy storage options are Pumped Hydro Storage (PHS) and Compressed Air Energy Storage (CAES). Taiwan has not ventured into CAES-related technologies due to geological and cost constraints. However, with the imperative of achieving net-zero carbon emissions by 2050, there's a substantial need for the development of a considerable amount of renewable energy. PHS has matured, boasting an overall installed capacity of 4.68 GW. CAES, presenting a similar scale and power generation duration to PHS, is now under consideration. Taiwan's geological composition, being a porous medium unlike salt caves, introduces flow field resistance affecting gas injection and extraction. This study employs a program analysis model to establish the system performance analysis capabilities of CAES. The finite volume model is then used to assess the impact of porous media, and the findings are fed back into the system performance analysis for correction. Subsequently, the financial implications are calculated and compared with existing literature. For Taiwan, the strategic development of CAES technology is crucial, not only for meeting energy needs but also for decentralizing energy allocation, a feature of great significance in regions lacking alternative natural resources.

Keywords: compressed-air energy storage, efficiency, porous media, financial feasibility

Procedia PDF Downloads 66
592 Violence against Police Officers in Germany

Authors: Anne T. Herr, Clemens Lorei

Abstract:

Employees of organizations with security tasks, such as emergency services, public order services, or police forces, work every day to ensure people's safety. Violence against police is, therefore, a relevant topic both socially and politically. An increase in violence is often discussed without there being any verifiable and generally valid data. So far, scientific research has mainly focused on offender characteristics and crime statistics. These surveys are mostly subjective, retrospective, and neglect the dynamics and interactions in concrete violent situations. Therefore, more recent research methods attempt to capture the issue of violence against emergency forces more comprehensively. However, the operationalization of the constructs and the methodological approach pose particular challenges. This contribution provides an overview of new perspectives on the understanding of violent assaults and identifies current research gaps. In addition, a new research project of the Hessian University of Police and Administration in Germany is presented. In the 'AMBOSafe' study, different theoretical backgrounds for understanding violence against police and emergency services personnel will be combined in order to capture as many different perspectives of violent assaults as possible in a multimodal research approach. In a retrospective as well as in a longitudinal survey, the conditions of escalation dynamics in the assaults are recorded and supplemented by the current and valid prevalence of physical and verbal assaults in a period of four months. In addition, qualitative interviews with those affected will be used to record more detailed descriptions of and the feelings during the assaults, as well as possible causes and connections between the different groups of people. In addition to the reports of the police forces, the motives of the attackers will be collected and supplemented by analyzing the criminal case files. This knowledge can contribute to a more comprehensive understanding of violent assaults against police forces in order to be able to derive scientifically based preventive measures.

Keywords: assaults, crime statistics, escalation dynamics, police

Procedia PDF Downloads 114
591 Symptoms Experiences among Thai Adults with Chronic Illnesses: A Study in an Urban Community Area of Bangkok

Authors: Orapan Thosingha, Tassana Boontong, Prapa Yuttatri, Vilaivan Thongcharoen, Soparn Potaya, Mattika Chaichan, Chanin Chakkrapopyodhin, Khwanthida Phimphakarn, Taddao Nabnean

Abstract:

This research aimed to explore symptom experiences among Thai adults with chronic illnesses living in an urban community area of Bangkok. The sample was 670 adults with ages ranging from 20-59 years. The majority of them (65.2%) had more than one disease. Hypertension, dyslipidemia, and diabetes were the first three diseases among them. About 58% were female, and 51.1 % stayed with their couples. The studied sample had relatively low socioeconomic status; 33.7% were wage workers, 15.2% were street vendors, and 10.4% were unemployed. About 54 % had family incomes less than 10,000 baht (300 US Dollars) per month, and 41.6% addressed that their incomes were not adequate for daily living. Although the majority of them (63.7%) did not have to pay for hospital visits, they still had to pay for public transportation and could not earn a wage or any income on the hospital visit day. The first three physical symptoms they experienced were knee pain (60.5%) due to being overweight, headache (47.0%), and insomnia (44.6%). About 45% stated that their incomes decreased after having chronic illnesses and 37.2% expressed that having lower incomes affected their living, 34.5% perceived being a burden, and 34.3% regret about depending on others. It can be concluded that adults with low socioeconomic status who experienced chronic illnesses and resided in an urban community area had complex needs. While caring for them, nurses should pay attention not only to a disease-related domain but also to a social-related domain. Reached-out clinics led by professional nurses who are well-prepared for primary medical care and home visit are strongly recommended. National Health Security Office should adopt this policy and develop an action plan to serve the needs of chronically ill adults with low socioeconomic status.

Keywords: chronic illnesses, urban community, socioeconomic status, symptom experiences, low incomes

Procedia PDF Downloads 113
590 One-Pot Synthesis of 5-Hydroxymethylfurfural from Hexose Sugar over Chromium Impregnated Zeolite Based Catalyst, Cr/H-ZSM-5

Authors: Samuel K. Degife, Kamal K. Pant, Sapna Jain

Abstract:

The world´s population and industrialization of countries continued to grow in an alarming rate irrespective of the security for food, energy supply, and pure water availability. As a result, the global energy consumption is observed to increase significantly. Fossil energy resources that mainly comprised of crude oil, coal, and natural gas have been used by mankind as the main energy source for almost two centuries. However, sufficient evidences are revealing that the consumption of fossil resource as transportation fuel emits environmental pollutants such as CO2, NOx, and SOx. These resources are dwindling rapidly besides enormous amount of problems associated such as fluctuation of oil price and instability of oil-rich regions. Biomass is a promising renewable energy candidate to replace fossil-based transportation fuel and chemical production. The present study aims at valorization of hexose sugars (glucose and fructose) using zeolite based catalysts in imidazolium based ionic liquid (1-butyl-3-methylimidazolium chloride, [BMIM] Cl) reaction media. The catalytic effect chromium impregnated H-ZSM-5 (Cr/H-ZSM-5) was studied for dehydration of hexose sugars. The wet impregnation method was used to prepare Cr/H-ZSM-5 catalyst. The characterization of the prepared catalyst was performed using techniques such as Fourier transform infrared spectroscopy (FT-IR), X-ray diffraction analysis (XRD), Temperature-programmed desorption of ammonia (NH3-TPD) and BET-surface area analysis. The dehydration product, 5-hydroxymethylfurfural (5-HMF), was analyzed using high-performance liquid chromatography (HPLC). Cr/H-ZSM-5 was effective in dehydrating fructose with 87% conversion and 55% yield 5-HMF at 180 oC for 30 min of reaction time compared with H-ZSM-5 catalyst which yielded only 31% of 5-HMF at identical reaction condition.

Keywords: chromium, hexose, ionic liquid, , zeolite

Procedia PDF Downloads 176
589 The Problem of Child Exploitation on Twitter: A Socio-Anthropological Perspective on Content Filtering Gaps

Authors: Samig Ibayev

Abstract:

This research addresses the problem of illegal child abuse content on the Twitter platform bypassing filtering systems and appearing before users from a social-anthropological perspective. Although the wide access opportunities provided by social media platforms to their users are beneficial in many ways, it is seen that they contain gaps that pave the way for the spread of harmful and illegal content. The aim of the study is to examine the inadequacies of the current content filtering mechanisms of the Twitter platform, to understand the psychological effects of young users unintentionally encountering such content and the social dimensions of this situation. The research was conducted with a qualitative approach and was conducted using digital ethnography, content analysis and user experiences on the Twitter platform. Digital ethnography was used to observe the frequency of child abuse content on the platform and how these contents were presented. The content analysis method was used to reveal the gaps in Twitter's current filtering mechanisms. In addition, detailed information was collected on the extent of psychological effects and how the perception of trust in social media changed through interviews with young users exposed to such content. The main contributions of the research are to highlight the weaknesses in the content moderation and filtering mechanisms of social media platforms, to reveal the negative effects of illegal content on users, and to offer suggestions for preventing the spread of such content. As a result, it is suggested that platforms such as Twitter should improve their content filtering policies in order to increase user security and fulfill their social responsibilities. This research aims to create significant awareness about social media content management and ethical responsibilities on digital platforms.

Keywords: Twitter, child exploitation, content filtering, digital ethnography, social anthropology

Procedia PDF Downloads 9
588 The Role and Significance of Mobile Gerdarmarie Battalions in the Canakkale Battles

Authors: Muzaffer Topgül, Ersi̇n Yilmaz

Abstract:

One of the unknown aspects of Çanakkale Battles is that the importance and contributions of Mobile Gendarmarie Battalion have not been fully understood. It was because the battles of the troops which were deployed more in interior parts of Gallipoli Peninsula, and the contributions of battle on level tactical troops were not considered as much as the studies on strategical or operative level troops. When the operation field and battle plans are examined, instead of deploying along the coast to put the forces with a power at zero level landing on the coast out of action, the main battle components are seen to have deployed as strong reserves in the more inner areas. The negative effect of the field on the great trop operation reveals the need for time in order to use the intervention forces. ‘Time’ emerged as the main factor in victory as a result of giving intervention opportunity to the troops. While ordering his soldiers in Conkbayırı to die rather than fight, Liutenant Colonel Mustafa Kemal, the Commander of the 19th division, also emphasized the significance of time. In this respect, the contribution of Mobile Gendarmarie Battalion which saved time for the troops to intervene can be clearly seen. During the study, the memoirs and the works written by military institutions based on the record sources under the light of the notes taken during the trips to the region were used. By preventing the enemies from capturing the area, Mobile Gendarmerie Battalions had an important role in Battles of Kerevizdere, Kireçtepe and Alçıtepe which were of great importance among the battles. The success of these battalions was expressed with compliment by both Turkish and foreign commanders that participated in the war. During the battles the losses of armed forces commissioned to keep the security and order brought about the formation of the regions deficient in state authority.

Keywords: Canakkale battles, mustafa kemal, mobile gerdarmarie, Ottoman empire, time

Procedia PDF Downloads 445
587 The Evolution Characteristics of Urban Ecological Patterns in Parallel Range-Valley Areas, China

Authors: Wen Feiming

Abstract:

As the ecological barrier of the Yangtze River, the ecological security of the Parallel Range-Valley area is very important. However, the unique geomorphic features aggravate the contradiction between man and land, resulting in the encroachment of ecological space. In recent years , relevant researches has focused on the single field of land science, ecology and landscape ecology, and it is difficult to systematically reflect the regularities of distribution and evolution trends of ecological patterns in the process of urban development. Therefore, from the perspective of "Production-Living-Ecological space", using spatial analysis methods such as Remote Sensing (RS) and Geographic Information Systems (GIS), this paper analyzes the evolution characteristics and driving factors of the ecological pattern of mountain towns in the parallel range-valley region from the aspects of land use structure, change rate, transformation relationship, and spatial correlation. It is concluded that the ecological pattern of mountain towns presents a trend from expansion and diffusion to agglomeration, and the dynamic spatial transfer is a trend from artificial transformation to the natural origin, while the driving effect analysis shows the significant characteristics of terrain attraction and construction barrier. Finally, combined with the evolution characteristics and driving mechanism, the evolution modes of "mountain area - concentrated growth", "trough area - diffusion attenuation" and "flat area - concentrated attenuation" are summarized, and the differentiated zoning and stratification ecological planning strategies are proposed here, in order to provide the theoretical basis for the sustainable development of mountain towns in parallel range-valley areas.

Keywords: parallel range-valley, ecological pattern, evolution characteristics, driving factors

Procedia PDF Downloads 103
586 Postmodern Navy to Transnational Adaptive Navy: Positive Peace with Borderless Institutional Network

Authors: Serkan Tezgel

Abstract:

Effectively managing threats and power that transcend national boundaries requires a reformulation from the traditional post-modern navy to an adaptive and institutional transnational navy. By analyzing existing soft power concept, post-modern navy, and sea power, this study proposes the transnational navy, founded on the triangle of main attributes of transnational companies, 'Global Competitiveness, Local Responsiveness, Worldwide Learning and Innovation Sharing', a new model which will lead to a positive peace with an institutional network. This transnational model necessitates 'Transnational Navies' to help establish peace with collective and transnational understanding during a transition period 'Reactive Postmodern Navy' has been experiencing. In this regard, it is fairly claimed that a new paradigm shift will revolve around sea power to establish good order at sea with collective and collaborative initiatives and bound to breed new theories and ideas in the forthcoming years. However, there are obstacles to overcome. Postmodern navies, currently shaped by 'Collective Maritime Security' and 'Collective Defense' concepts, can not abandon reactive applications and acts. States deploying postmodern navies to realize their policies on international platforms and seapower structures shaped by the axis of countries’ absolute interests resulted in multipolar alliances and coalitions, but the establishment of the peace. These obstacles can be categorized into three tiers in establishing a unique transnational model navy: Strategic, Organizational and Management challenges. To overcome these obstacles and challenges, postmodern navies should transform into cooperative, collective and independent soft transnational navies with the transnational mentality, global commons, and institutional network. Such an adaptive institution can help the world navigate to a positive peace.

Keywords: postmodern navy, transnational navy, transnational mentality, institutional network

Procedia PDF Downloads 519
585 Effect of Phaseolus vulgaris Inoculation on P. vulgaris and Zea mays Growth and Yield Cultivated in Intercropping

Authors: Nour Elhouda Abed, Bedj Mimi, Wahid Slimani, Mourad Atif, Abdelhakim Ouzzane, Hocine Irekti, Abdelkader Bekki

Abstract:

The most frequent system of cereal production in Algeria is fallow-wheat. This is an extensive system that meets only the half needs some cereals and fodder demand. Resorption of fallow has become a strategic necessity to ensure food security in response to the instability of supply and the persistence of higher food prices on the world market. Despite several attempts to replace the fallow by crop cultures, choosing the best crop remains. Today, the agronomic and economic interests of legumes are demonstrated. However, their crop culture remains marginalized because of the weakness and instability of their performance. In the context of improving legumes and cereals crops as well as fallow resorption, we undertook to test, in the field, the effect of rhizobial inoculation of Phaseolus vulgaris in association with Zea Mays. We firstly studied the genetic diversity of rhizobial strains that nodulate P.vulgaris isolated from fifteen (15) different regions. ARDRA had shown 18 different genetic profiles. Symbiotic characterization highlighted a strain that highly significantly improved the fresh and dry weight of the host plant, in comparison to the negative control (un-inoculated) and the positive control (inoculated with the reference strain CIAT 899). In the field, the selected strain increased significantly the growth and yield of P.vulgaris and Zea Mays comparing to the non-inoculated control. However, the mix inoculation (selected strain+ Ciat 899) had not given the best parameters showing, thus, no synergy between the strains. These results indicate the replacing fallow by a crop legume in intercropping with cereals crops.

Keywords: fallow, intercropping, inoculation, legumes-cereals

Procedia PDF Downloads 366
584 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 261
583 Feasibility Study of Tidal Current of the Bay of Bengal to Generate Electricity as a Renewable Energy

Authors: Myisha Ahmad, G. M. Jahid Hasan

Abstract:

Electricity is the pinnacle of human civilization. At present, the growing concerns over significant climate change have intensified the importance of the use of renewable energy technologies for electricity generation. The interest is primarily due to better energy security, smaller environmental impact and providing a sustainable alternative compared to the conventional energy sources. Solar power, wind, biomass, tidal power, and wave power are some of the most reliable sources of renewable energy. Ocean approximately holds 2×10³ TW of energy and has the largest renewable energy resource on the planet. Ocean energy has many forms namely, encompassing tides, ocean circulation, surface waves, salinity and thermal gradients. Ocean tide in particular, associates both potential and kinetic energy. The study is focused on the latter concept that deals with tidal current energy conversion technologies. Tidal streams or marine currents generate kinetic energy that can be extracted by marine current energy devices and converted into transmittable energy form. The principle of technology development is very comparable to that of wind turbines. Conversion of marine tidal resources into substantial electrical power offers immense opportunities to countries endowed with such resources and this work is aimed at addressing such prospects of Bangladesh. The study analyzed the extracted current velocities from numerical model works at several locations in the Bay of Bengal. Based on current magnitudes, directions and available technologies the most fitted locations were adopted and possible annual generation capacity was estimated. The paper also examines the future prospects of tidal current energy along the Bay of Bengal and establishes a constructive approach that could be adopted in future project developments.

Keywords: bay of Bengal, energy potential, renewable energy, tidal current

Procedia PDF Downloads 375
582 Need for Privacy in the Technological Era: An Analysis in the Indian Perspective

Authors: Amrashaa Singh

Abstract:

In the digital age and the large cyberspace, Data Protection and Privacy have become major issues in this technological era. There was a time when social media and online shopping websites were treated as a blessing for the people. But now the tables have turned, and the people have started to look at them with suspicion. They are getting aware of the privacy implications, and they do not feel as safe as they used to initially. When Edward Snowden informed the world about the snooping United States Security Agencies had been doing, that is when the picture became clear for the people. After the Cambridge Analytica case where the data of Facebook users were stored without their consent, the doubts arose in the minds of people about how safe they actually are. In India, the case of spyware Pegasus also raised a lot of concerns. It was used to snoop on a lot of human right activists and lawyers and the company which invented the spyware claims that it only sells it to the government. The paper will be dealing with the privacy concerns in the Indian perspective with an analytical methodology. The Supreme Court here had recently declared a right to privacy a Fundamental Right under Article 21 of the Constitution of India. Further, the Government is also working on the Data Protection Bill. The point to note is that India is still a developing country, and with the bill, the government aims at data localization. But there are doubts in the minds of many people that the Government would actually be snooping on the data of the individuals. It looks more like an attempt to curb dissenters ‘lawfully’. The focus of the paper would be on these issues in India in light of the European Union (EU) General Data Protection Regulation (GDPR). The Indian Data Protection Bill is also said to be loosely based on EU GDPR. But how helpful would these laws actually be is another concern since the economic and social conditions in both countries are very different? The paper aims at discussing these concerns, how good or bad is the intention of the government behind the bill, and how the nations can act together and draft common regulations so that there is some uniformity in the laws and their application.

Keywords: Article 21, data protection, dissent, fundamental right, India, privacy

Procedia PDF Downloads 114
581 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 425
580 Ensuring Safe Operation by Providing an End-To-End Field Monitoring and Incident Management Approach for Autonomous Vehicle Based on ML/Dl SW Stack

Authors: Lucas Bublitz, Michael Herdrich

Abstract:

By achieving the first commercialization approval in San Francisco the Autonomous Driving (AD) industry proves the technology maturity of the SAE L4 AD systems and the corresponding software and hardware stack. This milestone reflects the upcoming phase in the industry, where the focus is now about scaling and supervising larger autonomous vehicle (AV) fleets in different operation areas. This requires an operation framework, which organizes and assigns responsibilities to the relevant AV technology and operation stakeholders from the AV system provider, the Remote Intervention Operator, the MaaS provider and regulatory & approval authority. This holistic operation framework consists of technological, processual, and organizational activities to ensure safe operation for fully automated vehicles. Regarding the supervision of large autonomous vehicle fleets, a major focus is on the continuous field monitoring. The field monitoring approach must reflect the safety and security criticality of incidents in the field during driving operation. This includes an automatic containment approach, with the overall goal to avoid safety critical incidents and reduce downtime by a malfunction of the AD software stack. An End-to-end (E2E) field monitoring approach detects critical faults in the field, uses a knowledge-based approach for evaluating the safety criticality and supports the automatic containment of these E/E faults. Applying such an approach will ensure the scalability of AV fleets, which is determined by the handling of incidents in the field and the continuous regulatory compliance of the technology after enhancing the Operational Design Domain (ODD) or the function scope by Functions on Demand (FoD) over the entire digital product lifecycle.

Keywords: field monitoring, incident management, multicompliance management for AI in AD, root cause analysis, database approach

Procedia PDF Downloads 75
579 Integration of Agroforestry Shrub for Diversification and Improved Smallholder Production: A Case of Cajanus cajan-Zea Mays (Pigeonpea-Maize) Production in Ghana

Authors: F. O. Danquah, F. Frimpong, E. Owusu Danquah, T. Frimpong, J. Adu, S. K. Amposah, P. Amankwaa-Yeboah, N. E. Amengor

Abstract:

In the face of global concerns such as population increase, climate change, and limited natural resources, sustainable agriculture practices are critical for ensuring food security and environmental stewardship. The study was conducted in the Forest zones of Ghana during the major and minor seasons of 2023 cropping seasons to evaluate maize yield productivity improvement and profitability of integrating Cajanus cajan (pigeonpea) into a maize production system described as a pigeonpea-maize cropping system. This is towards an integrated soil fertility management (ISFM) with a legume shrub pigeonpea for sustainable maize production while improving smallholder farmers' resilience to climate change. A split-plot design with maize-pigeonpea (Pigeonpea-Maize intercrop – MPP and No pigeonpea/ Sole maize – NPP) and inorganic fertilizer rate (250 kg/ha of 15-15-15 N-P2O5-K2O + 250 kg/ha Sulphate of Ammonia (SoA) – Full rate (FR), 125 kg/ha of 15-15-15 N-P2O5-K2O + 125 kg/ha Sulphate of Ammonia (SoA) – Half rate (HR) and no inorganic fertilizer (NF) as control) was used as the main plot and subplot treatments respectively. The results indicated a significant interaction of the pigeonpea-maize cropping system and inorganic fertilizer rate on the growth and yield of the maize with better and similar maize productivity when HR and FR were used with pigeonpea biomass. Thus, the integration of pigeonpea and its biomass would result in the reduction of recommended fertiliser rate to half. This would improve farmers’ income and profitability for sustainable maize production in the face of climate change.

Keywords: agroforestry tree, climate change, integrated soil fertility management, resource use efficiency

Procedia PDF Downloads 57