Search results for: public order and security act
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20578

Search results for: public order and security act

18238 Cloud Monitoring and Performance Optimization Ensuring High Availability

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy

Procedia PDF Downloads 61
18237 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 168
18236 Prospective Analysis of Micromobility in the City of Medellín

Authors: Saúl Rivero, Estefanya Marín, Katherine Bolaño, Elena Urán, Juan Yepes, Andrés Cossio

Abstract:

Medellín is the Colombian city with the best public transport systems in the country, which is made up of two metro lines, five metrocables, two BRT-type bus lines, and a tram. But despite the above, the Aburrá Valley, the area in which the city is located, has about 3000 km of roads, which for the existing population of 3.2 million inhabitants, gives an indicator of 900 meters of road per 1000 inhabitants, which is lower than the country's average, which is approximately 3900 meters. In addition, given that in Medellín, there is approximately one vehicle for every three inhabitants, the problems of congestion and environmental pollution have worsened over the years. In this sense, due to the limitations of physical space, the low public investment in road infrastructure, it is necessary to opt for mobility alternatives according to the above. Among the options for the city, there is what is known as micromobility. Micromobility is understood to be those small and light means of transport that are used for short distances, that use electrical energy, such as skateboards and bicycles. Taking into account the above, in this work, the current state and future of micromobility in the city of Medellín were analyzed, carrying out a prospective analysis, supported by a PEST analysis, but also of the crossed impact matrices; of influence and dependence; and the technique of the actor's game. The analysis was carried out for two future scenarios: one normal and one optimistic. Result of the analysis, it was determined that micromobility as an alternative social practice to mobility in the city of Medellín has favorable conditions since the local government has adopted strategies such as the Metropolitan Bicycle Master Plan of Valle de Aburrá and the plan " Bicycle paths in the city: more public spaces for life,” where a projection of 400 kilometers of bicycle paths was estimated by the year 2030, as for that same year it is expected that 10% of all trips in the region will be in bike mode. The total trip indicator is an achievable goal, while that of the number of kilometers of bike paths would be close to being met.

Keywords: electric vehicles, micromobilty, public transport, sustainable transport

Procedia PDF Downloads 203
18235 Challenges of e-Service Adoption and Implementation in Nigeria: Lessons from Asia

Authors: Kazeem Oluwakemi Oseni, Kate Dingley

Abstract:

E-Service has moved from the usual manual and traditional way of rendering services to electronic service provision for the public and there are several reasons for implementing these services, Airline ticketing have gone from its manual traditional way to an intelligent web-driven service of purchasing. Many companies have seen their profits doubled through the use of online services in their operation and a typical example is Hewlett Packard (HP) which is rapidly transforming their after sales business into a profit generating e-service business unit. This paper will examine the various challenges confronting e-Service adoption and implementation in Nigeria and also analyse lessons learnt from e-Service adoption and implementation in Asia to see how it could be useful in Nigeria which is a lower middle income country. Based on the analysis of the online survey data. It has been identified that the public in Nigeria are much aware of e-Services but successful adoption and implementation have been the problems faced.

Keywords: e-government service, adoption, implementation, Nigeria, Asia

Procedia PDF Downloads 462
18234 Teacher Education in a Bilingual Perspective: Brazilian Sign Language and Portuguese

Authors: Neuma Chaveiro, Juliana Guimarães Faria

Abstract:

Introduction: The thematic that guides this study is teacher training for the teaching of sign language in a perspective of bilingual education – specifically aimed at Brazilian public schools that offer inclusive education, and that have, among its students, deaf children who use Brazilian Sign Language as a means of communication and expression. In the Teacher Training Course for Letters/Libras at the Universidade Federal de Goiás/UFG, we developed a bilingual education project for the deaf, linked to PIBID (Institutional Scholarship for Teaching Initiation Program), funded by the Brazilian Federal Government through CAPES (Coordination for the Improvement of Higher Education Personnel). Goals: to provide the education of higher education teachers to work in public schools in basic education and to insert students from the UFG’s Letters/Libras course in the school’s daily life, giving them the opportunity for the creation and participation in methodological experiences and of teaching practices in order to overcome the problems identified in the teaching-learning process of deaf students, in a bilingual perspective, associating Libras (Brazilian Sign Language) and Portuguese. Methodology: qualitative approach and research-action, prioritizing action – reflection – action of the people involved. The Letters-Libras PIBID of the College of Letters/UFG, in this qualitative context, is guided by the assumptions of investigation-action to contribute to the education of the Libras teacher. Results: production of studies and researches in the area of education, professionalization and teaching practice for the degree holder in Letters: Libras; b) studies, research and training in bilingual education; c) clarification and discussion of the myths that permeate the reality of users of sign languages; d) involving students in the development of didactic materials for bilingual education. Conclusion: the PIBID Project Letters/Libras allows, both to the basic education school and to the teachers in training for the teaching of Libras, an integrated and collective work partnership, with discussions and changes in relation to bilingual education for the deaf and the teaching of Libras.

Keywords: deaf, sign language, teacher training, educacion

Procedia PDF Downloads 301
18233 Design Analysis for Declining Admission Trend in Canada Public Diploma Programs

Authors: Zulfiqar Ali

Abstract:

The current survey reports and data demonstrate a declining trend of admissions in instructor-led synchronous diploma programs in Canadian public higher education institutes. A significant impact can also be seen on various Information Technology (IT) related diploma programs in prominent Canadian higher education institutes across the country. The significant external factors that impact the students’ interests in admission in instructor-led synchronous Information Technology related diploma programs include but not limited to easy access to online learning materials provided by external competitors. The high involvement of the IT giants like Microsoft, Cisco, Google, AWS, Linux in training and certification programs through their Learning Management Systems (LMS) came with their academy’s establishment. They offer and provide very scientific advanced kind of learning and teaching resources embedded with cloud and artificial Intelligence (AI) tools, techniques and design. The other external factor is the best fit of rate of change of technology (velocity) in business vis-à-vis the rate of change of adoption and transformation of could-based Artificial Intelligence (AI) in Canadian public higher education institutes for diploma programs. The significant internal factors may include but are not limited to the legacy type of curriculum design, tools, techniques, style, and delivery. The other major contribution in declining admission trend in Canadian public higher education institute’s IT related programs.is the diversity of learning and teaching styles comes from existing hiring and immigration processes. The proposed research addresses the major contribution of both internal and external factors in declining admission trend in instructor-led synchronous diploma programs in Canadian public higher education institutes. The research approaches to be adopted for the proposed work include collecting data, filtering data, quantitative analysis, qualitative analysis and mixed approach. The focal point of this research is the contribution of major internal factors in declining admission trend including curriculum design, delivery methods, academic integrity, velocity, cloud-based AI tools, techniques and integration with existing learning management system. Finally, the research results come up with analysis-based recommendations and design to cope with challenge of declining admission trend in Canadian public higher education institutes diploma programs vis-à-vis internal and external factors.

Keywords: advanced curriculum design, analysis of internal educational factors, analysis of external educational factors, educational technology

Procedia PDF Downloads 4
18232 Spatial Information and Urbanizing Futures

Authors: Mohammad Talei, Neda Ranjbar Nosheri, Reza Kazemi Gorzadini

Abstract:

Today municipalities are searching for the new tools for increasing the public participation in different levels of urban planning. This approach of urban planning involves the community in planning process using participatory approaches instead of the long traditional top-down planning methods. These tools can be used to obtain the particular problems of urban furniture form the residents’ point of view. One of the tools that is designed with this goal is public participation GIS (PPGIS) that enables citizen to record and following up their feeling and spatial knowledge regarding main problems of the city, specifically urban furniture, in the form of maps. However, despite the good intentions of PPGIS, its practical implementation in developing countries faces many problems including the lack of basic supporting infrastructure and services and unavailability of sophisticated public participatory models. In this research we develop a PPGIS using of Web 2 to collect voluntary geodataand to perform spatial analysis based on Spatial OnLine Analytical Processing (SOLAP) and Spatial Data Mining (SDM). These tools provide urban planners with proper informationregarding the type, spatial distribution and the clusters of reported problems. This system is implemented in a case study area in Tehran, Iran and the challenges to make it applicable and its potential for real urban planning have been evaluated. It helps decision makers to better understand, plan and allocate scarce resources for providing most requested urban furniture.

Keywords: PPGIS, spatial information, urbanizing futures, urban planning

Procedia PDF Downloads 729
18231 Effects of Transit Fare Discount Programs on Passenger Volumes and Transferring Behaviors

Authors: Guan-Ying Chen, Han-Tsung Liou, Shou-Ren Hu

Abstract:

To address traffic congestion problems and encourage the use of public transportation systems in the Taipei metropolitan area, the Taipei City Government and the New Taipei City Government implemented a monthly ticket policy on April 16, 2018. This policy offers unlimited rides on the Taipei MRT, Taipei City Bus, New Taipei City Bus, Danhai Light Rail, and Public Bike (YouBike) on a monthly basis. Additionally, both city governments replaced the smart card discount policy with a new frequent flyer discount program (referred to as the loyal customer program) on February 1, 2020, introducing a differential pricing policy. Specifically, the more frequently the Taipei MRT system is used, the greater the discounts users receive. To analyze the impact of the Taipei public transport monthly ticket policy and the frequent user discount program on the passenger volume of the Taipei MRT system and the transferring behaviors of MRT users, this study conducts a trip-chain analysis using transaction data from Taipei MRT smart cards between September 2017 and December 2020. To achieve these objectives, the study employs four indicators: 1) number of passengers, 2) average number of rides, 3) average trip distance, and 4) instances of multiple consecutive rides. The study applies the t-test and Mann-Kendall trend test to investigate whether the proposed indicators have changed over time due to the implementation of the discount policy. Furthermore, the study examines the travel behaviors of passengers who use monthly tickets. The empirical results of the study indicate that the implementation of the Taipei public transport monthly ticket policy has led to an increase in the average number of passengers and a reduction in the average trip distance. Moreover, there has been a significant increase in instances of multiple consecutive rides, attributable to the unlimited rides offered by the monthly tickets. The impact of the frequent user discount program on changes in MRT passengers is not as pronounced as that of the Taipei public transportation monthly ticket policy. This is partly due to the fact that the frequent user discount program is only applicable to the Taipei MRT system, and the passenger volume was greatly affected by the COVID-19 pandemic. The findings of this research can serve as a reference for Taipei MRT Corporation in formulating its fare strategy and can also provide guidance for the Taipei and New Taipei City Governments in evaluating differential pricing policies for public transportation systems.

Keywords: frequent user discount program, mass rapid transit, monthly ticket, smart card

Procedia PDF Downloads 88
18230 Developing Creativity as a Scientific Literacy among IT Engineers towards Sustainability

Authors: Chunfang Zhou

Abstract:

The growing issues of sustainability have increased the discussions on how to foster “green engineers” from diverse perspectives in both contexts of education and organizations. As creativity has been considered as the first stage of innovation process that can also be regarded as a path to sustainability, this paper will particularly propose creativity as a scientific literacy meaning a collection of awareness, ability, and skills about sustainability. From this sense, creativity should be an element in IT engineering education and organizational learning programmes, since IT engineers are one group of key actors in designing, researching and developing social media products that are most important channels of improving public awareness of sustainability. This further leads this paper to discuss by which pedagogical strategies and by which training methods in organizations, creativity and sustainability can be integrated into IT engineering education and IT enterprise innovation process in order to meeting the needs of ‘creative engineers’ in the society changes towards sustainability. Accordingly, this paper contributes to future work on the links between creativity, innovation, sustainability, and IT engineering development both theoretically and practically.

Keywords: creativity, innovation, IT engineers, sustainability

Procedia PDF Downloads 331
18229 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

Authors: Che-Wei Lee, Bay-Erl Lai

Abstract:

A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.

Keywords: steganography, data hiding, secret authentication, secret sharing

Procedia PDF Downloads 246
18228 South African Municipal Service Delivery Failure and Public Value Theory

Authors: Andrew Enaifoghe

Abstract:

Municipalities are the most fundamental units of governance, and they are responsible for providing basic services and supporting growth in the areas they rule. South African local government is primarily understood in terms of service delivery, and the South African constitution provides municipalities with the responsibility of mobilizing economic resources, to better the lives of all people. Essential public services are the primary pillars of enhanced quality of life, and appropriate supplies of safe water and sanitation are required for life, well-being, and human dignity. Therefore, having access to basic services is directly tied to social inclusion and social capital, and towns' inability to offer services can have a negative influence on social and economic growth. The problem of service delivery is seen as one of the biggest challenges facing South African municipalities today. This study attempts to assess South African municipal service delivery. Focusing on the main causes of service delivery challenges, the study also looks at the impact of these challenges to identify ways to minimize such challenges by introducing legal instruments such as municipal budgeting and annual reports. A qualitative design was adopted, and data were collected using a desktop technique and analyzed based on content. While public engagement in municipal affairs is required by law, considerable work has to be done to ensure successful participation. Finally, municipalities were deemed to need to do more to improve human capacity to offer services.

Keywords: municipalities, service delivery, corruption, monitoring, South Africa

Procedia PDF Downloads 154
18227 Failure Cases Analysis in Petrochemical Industry

Authors: S. W. Liu, J. H. Lv, W. Z. Wang

Abstract:

In recent years, the failure accidents in petrochemical industry have been frequent, and have posed great security problems in personnel and property. The improvement of petrochemical safety is highly requested in order to prevent re-occurrence of severe accident. This study focuses on surveying the failure cases occurred in petrochemical field, which were extracted from journals of engineering failure, including engineering failure analysis and case studies in engineering failure analysis. The relation of failure mode, failure mechanism, type of components, and type of materials was analyzed in this study. And the analytical results showed that failures occurred more frequently in vessels and piping among the petrochemical equipment. Moreover, equipment made of carbon steel and stainless steel accounts for the majority of failures compared to other materials. This may be related to the application of the equipment and the performance of the material. In addition, corrosion failures were the largest in number of occurrence in the failure of petrochemical equipment, in which stress corrosion cracking accounts for a large proportion. This may have a lot to do with the service environment of the petrochemical equipment. Therefore, it can be concluded that the corrosion prevention of petrochemical equipment is particularly important.

Keywords: cases analysis, corrosion, failure, petrochemical industry

Procedia PDF Downloads 310
18226 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 270
18225 Second Harmonic Generation of Higher-Order Gaussian Laser Beam in Density Rippled Plasma

Authors: Jyoti Wadhwa, Arvinder Singh

Abstract:

This work presents the theoretical investigation of an enhanced second-harmonic generation of higher-order Gaussian laser beam in plasma having a density ramp. The mechanism responsible for the self-focusing of a laser beam in plasma is considered to be the relativistic mass variation of plasma electrons under the effect of a highly intense laser beam. Using the moment theory approach and considering the Wentzel-Kramers-Brillouin approximation for the non-linear Schrodinger wave equation, the differential equation is derived, which governs the spot size of the higher-order Gaussian laser beam in plasma. The nonlinearity induced by the laser beam creates the density gradient in the background plasma electrons, which is responsible for the excitation of the electron plasma wave. The large amplitude electron plasma wave interacts with the fundamental beam, which further produces the coherent radiations with double the frequency of the incident beam. The analysis shows the important role of the different modes of higher-order Gaussian laser beam and density ramp on the efficiency of generated harmonics.

Keywords: density rippled plasma, higher order Gaussian laser beam, moment theory approach, second harmonic generation.

Procedia PDF Downloads 182
18224 Fate of Organic Waste, Refuse and Inert from Municipal Discards as Source of Energy and Nutrient in India: A Brief Review

Authors: Kunwar Paritosh, Vivekanand Vivekanand, Nidhi Pareek

Abstract:

Presently, India depends primarily on fossil fuels for its acute energy demand. The swift in development of India in last two decades is accentuating its natural resources and compelling expenditures to cope energy security for the habitats. A total inhabitant of 1.2 billion, observing growing industrialization; is generating 68.8 million tonnes of municipal solid waste per year, 53.7 million tonnes is collected, and only trifling amount of 10.3 million tonnes of waste is treated per year that integrates to a massive amount of unimaginable land hill. In India, waste is mostly landfilled and/or incinerated with low technology and is poorly managed. Underutilization of this waste not only gulps resources but also stresses environment, public health and bionetwork thus affecting the bioeconomy negatively. It also creates conditions that invoke inevitable expenditures and loss of its renewable energy potential. The non-scientific approach to manage waste may lead to an economy downfall, underutilization and degradation of natural resources. Waste treatment technologies must be scientifically tailored and engineered as per the type of waste where it may be utilized as a source of energy (here biogas) and nutrients employing anaerobic digestion to the sorted waste. This paper presents a brief review on current practices, key achievements and forthcoming aspects of harnessing energy from municipal solid waste in Indian scenario.

Keywords: municipal discards, organic waste, anaerobic digestion, incineration, energy

Procedia PDF Downloads 264
18223 Robust Fractional Order Controllers for Minimum and Non-Minimum Phase Systems – Studies on Design and Development

Authors: Anand Kishore Kola, G. Uday Bhaskar Babu, Kotturi Ajay Kumar

Abstract:

The modern dynamic systems used in industries are complex in nature and hence the fractional order controllers have been contemplated as a fresh approach to control system design that takes the complexity into account. Traditional integer order controllers use integer derivatives and integrals to control systems, whereas fractional order controllers use fractional derivatives and integrals to regulate memory and non-local behavior. This study provides a method based on the maximumsensitivity (Ms) methodology to discover all resilient fractional filter Internal Model Control - proportional integral derivative (IMC-PID) controllers that stabilize the closed-loop system and deliver the highest performance for a time delay system with a Smith predictor configuration. Additionally, it helps to enhance the range of PID controllers that are used to stabilize the system. This study also evaluates the effectiveness of the suggested controller approach for minimum phase system in comparison to those currently in use which are based on Integral of Absolute Error (IAE) and Total Variation (TV).

Keywords: modern dynamic systems, fractional order controllers, maximum-sensitivity, IMC-PID controllers, Smith predictor, IAE and TV

Procedia PDF Downloads 70
18222 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 98
18221 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System

Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi

Abstract:

The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.

Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA

Procedia PDF Downloads 119
18220 Cost-Effective Hybrid Cloud Framework for HEI’s

Authors: Shah Muhammad Butt, Ahmed Masaud Ansari

Abstract:

Present Financial crisis in Higher Educational Institutes (HEIs) facing lots of problems considerable budget cuts, make difficult to meet the ever growing IT-based research and learning needs, institutions are rapidly planning and promoting cloud-based approaches for their academic and research needs. A cost effective Hybrid Cloud framework for HEI’s will provide educational services for campus or intercampus communication. Hybrid Cloud Framework comprises Private and Public Cloud approaches. This paper will propose the framework based on the Open Source Cloud (OpenNebula for Virtualization, Eucalyptus for Infrastructure, and Aneka for programming development environment) combined with CSP’s services which are delivered to the end-user via the Internet from public clouds.

Keywords: educational services, hybrid campus cloud, open source, electrical and systems sciences

Procedia PDF Downloads 461
18219 Saliency Detection Using a Background Probability Model

Authors: Junling Li, Fang Meng, Yichun Zhang

Abstract:

Image saliency detection has been long studied, while several challenging problems are still unsolved, such as detecting saliency inaccurately in complex scenes or suppressing salient objects in the image borders. In this paper, we propose a new saliency detection algorithm in order to solving these problems. We represent the image as a graph with superixels as nodes. By considering appearance similarity between the boundary and the background, the proposed method chooses non-saliency boundary nodes as background priors to construct the background probability model. The probability that each node belongs to the model is computed, which measures its similarity with backgrounds. Thus we can calculate saliency by the transformed probability as a metric. We compare our algorithm with ten-state-of-the-art salient detection methods on the public database. Experimental results show that our simple and effective approach can attack those challenging problems that had been baffling in image saliency detection.

Keywords: visual saliency, background probability, boundary knowledge, background priors

Procedia PDF Downloads 432
18218 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 371
18217 Classification of High Order Thinking Skills (HOTS)

Authors: Mohammed Alkiyumi

Abstract:

Educational systems are currently paying special attention to developing learners' higher thinking skills to develop the capabilities of human resources to deal with contemporary challenges. Although psychologists disagree about the concept of higher-order thinking skills and the skills they include, there is unlimited effort in designing them and building strategies for their implementation. The most important factor helping to develop these skills is their classification according to specific criteria, and the most important of these classifications is Bloom's classification, which is dominant in most educational systems at all levels. Previous classifications have many limitations, including the comprehensiveness of the skills they contain, the logical structure of their hierarchy, and classification criteria. Therefore, this article puts another step in this area by providing a new classification of higher-order thinking skills that includes five categories: the first response stage, transformative stage, application, reasoning stage, and the production stage with a logical justification for this classification, with some techniques to developing it among learners.

Keywords: high-order thinking skills, classification, teaching, education

Procedia PDF Downloads 55
18216 Employee Job Performance and Supervisor Workplace Gossip Employee Job Engagement's Mediation Effect

Authors: Pphakamani Irvine Dlamini

Abstract:

The impact of supervisory gossip on subordinate work performance was investigated in this paper. The paper postulated that supervisory gossip, both bad and positive, has an impact on employee job engagement, which in turn has an impact on employee job performance. Data was collected from 238 employees and supervisors from the Mpumalanga Government Municipality in South Africa using a dyadic study approach. Employees responded to questions on supervisor gossip and job engagement, while supervisors responded to questions about employee work performance. Three waves of data gathering were carried out. Favourable superior gossip had a positive and substantial effect on employee job engagement, which increased employee job performance, according to the study, but negative superior gossip had a positive but insignificant effect on employee job engagement. The multicultural aspect of the municipality, as well as causation concerns and frequent method biases connected with research design, hampered the study. After successfully disentangling the supervisor-subordinate reciprocal communication web using Social Exchange Theory (SET), the study suggests that managers should instil effective ways for using both positive and negative gossip in the workplace to achieve favourable employee outcomes. Positive gossip creates workplace rivalry and competition, but negative gossip creates tension, stress, and mistrust among employees. This study attempted to assess the implication of supervisor gossip on employee job engagement and performance in the public service sector, whose employees are characterised by high job security as compared to their peers in the private sector.

Keywords: worlplace gossip, supervisor, employee engagement, LMX

Procedia PDF Downloads 128
18215 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE

Authors: Emad Bataineh, Sara Al-Mutawa

Abstract:

The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.

Keywords: e-government portal, e-service, usability, TAM model

Procedia PDF Downloads 436
18214 Income Inequality and Its Effects on Household Livelihoods in Parker Paint Community, Liberia

Authors: Robertson Freeman

Abstract:

The prime objective of this research is to examine income inequality and its effects on household livelihoods in Parker Paint. Many researchers failed to address the potential threat of income inequality on diverse household livelihood indicators, including health, food, housing, transport and many others. They examine and generalize the effects of income differentials on household livelihoods by addressing one indicator of livelihood security. This research fills the loopholes of previous research by examining the effects of income inequality and how it affects the livelihoods of households, taking into consideration livelihood indicators including health, food security, and transport. The researcher employed the mixed research method to analyze the distribution of income and solicit opinions of household heads on the effects of their monthly income on their livelihoods. Age and sex structure, household composition, type of employment and educational status influence income inequality. The level of income, Lorenz curve and the Gini coefficient was mutually employed to calculate and determine the level of income inequality. One hundred eighty-two representing 96% of household heads are employed while 8, representing 4%, are unemployed. However, out of a total number of 182 employed, representing 96%, 27 people representing 14%, are employed in the formal private sector, while 110, representing 58%, are employed in the private informal sector. Monthly average income, savings, investments and unexpected circumstances affect the livelihood of households. Infrastructural development and wellbeing should be pursued by reducing expenditure earmarked in other sectors and channeling the funds towards the provision of household needs. One of the potent tools for consolidating household livelihoods is to initiate livelihood empowerment programs. Government and private sector agencies should establish more health insurance schemes, providing mosquito nets, immunization services, public transport, as well as embarking on feeding programs, especially in the remote areas of Parker paint. To climax the research findings, self-employment, entrepreneurship and the general private sector employment is a transparent double-edged sword. If employed in the private sector, there is the likelihood to increase one’s income. However, this also induces the income gap between the rich and poor since many people are exploited by affluence, thereby relegating the poor from the wealth hierarchy. Age and sex structure, as well as type of employment, should not be overlooked since they all play fundamental roles in influencing income inequality. Savings and investments seem to play a positive role in reducing income inequality. However, savings and investment in this research affect livelihoods negatively. It behooves mankind to strive and work hard to the best of ability in earning sufficient income and embracing measures to retain his financial strength. In so doing, people will be able to provide basic household needs, celebrate the reduction in unemployment and dependence and finally ensure sustainable livelihoods.

Keywords: income, inequality, livelihood, pakerpaint

Procedia PDF Downloads 128
18213 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 93
18212 The Feasibility of a Protected Launch Site near Melkbosstrand for a Public Transport Ferry across Table Bay, Cape Town

Authors: Mardi Falck, André Theron

Abstract:

Traffic congestion on the Northern side of Table Bay is a major problem. In Gauteng, the implementation of the Gautrain between Pretoria and Johannesburg, solved their traffic congestion. In 2002 two entrepreneurs endeavoured to implement a hovercraft ferry service across the bay from Table View to the Port of Cape Town. However, the EIA process proved that disgruntled residents from the area did not agree with their location for a launch site. 17 years later the traffic problem has not gone away, but instead the congestion has increased. While property prices in the City Bowl of Cape Town are ever increasing, people tend to live more on the outskirts of the CBD and commute to work. This means more vehicles on the road every day and the public transport services cannot keep up with the demand. For this reason, the study area of the previous hovercraft plans is being extended further North. The study’s aim is thus to determine the feasibility of a launch site North of Bloubergstrand to launch and receive a public transport ferry across Table Bay. The feasibility is being established by researching ferry services across the world and on what makes them successful. Different types of ferries and their operational capacities in terms of weather and waves are researched and by establishing the offshore and nearshore wind and wave climate for the area, an appropriate protected launch site is determined. It was concluded that travel time could potentially be halved. A hovercraft proved to be the most feasible ferry type, because it does not require a conventional harbour. Other types of vessels require a protected launch site because of the wave climate. This means large breakwaters that influence the cost substantially. The Melkbos Cultural Centre proved to be the most viable option for the location of the launch site, because it already has buildings and infrastructure. It is recommended that, if a harbour is chosen for the proposed ferry service, it could be used for more services like fishing, eco-tourism and leisure. Further studies are recommended to optimise the feasibility of such a harbour.

Keywords: Cape Town, ferry, public, Table Bay

Procedia PDF Downloads 153
18211 Effective Public Health Communication: Vaccine Health Messaging with Aboriginal and Torres Strait Islander Peoples

Authors: Maria Karidakis, Barbara Kelly

Abstract:

The challenges precipitated by the advent of COVID-19 have brought to the fore the task governments and key stakeholders are faced with; ensuring public health communication is readily accessible to vulnerable populations. COVID-19 has presented challenges for the provision and reception of timely, accessible, and accurate health information pertaining to vaccine health messaging to Aboriginal and Torres Strait Islander peoples. The aim of this qualitative study was to explore strategies used by Aboriginal-led organisations to improve communication about COVID-19 and vaccination for their communities and to explore how these mediation and outreach strategies were received by community members. We interviewed 6 Aboriginal-led organisations and 15 community members from several states across Australian, and these interviews were analysed thematically. The findings suggest that effective public health communication is enhanced when aFirst nations-led response defines the governance that happens in First Nations communities. Pro-active and self-determining Aboriginal leadership and decision-making helps drive the response to counter a growing trend towards vaccine hesitancy. Other strategies include establishing partnerships with government departments and relevant non-governmental organisations to ensure services are implemented and culturally appropriate. The outcomes of this research will afford policymakers, stakeholders in healthcare, and cultural mediators the capacity to identify strengths and potential problems associated with pandemic health information and to subsequently implement creative and culturally specific solutions that go beyond the provision of written documentation via translation or interpreting. It will also enable governing bodies to adjust multilingual polices and to adopt mediation strategies that will improve information delivery and intercultural services on a national and international level.

Keywords: intercultural communication, qualitative, public health communication, COVID-19, pandemic, mediated communication, first nations people

Procedia PDF Downloads 165
18210 A Dynamic Panel Model to Evaluate the Impact of Debt Relief on Poverty

Authors: Loujaina Abdelwahed

Abstract:

Debt relief granted to low-and middle-income countries effectively provides additional funds for governments that can be used to increase public investment on poverty-reducing services to alleviate poverty and boost economic growth. However, little is known about the extent to which the poor benefit from the increased public investment. This study aims to assess the impact of debt relief granted through multiple initiatives during the 1990s on poverty reduction. In particular, it assesses the impact on the level, depth and severity of poverty in 76 low-and middle income countries over the period 1990-2011. Debt relief is found to have a significant impact on reducing the level, the depth and the severity of poverty. Analysis of the different types of debt relief reveals that debt service relief reduces poverty, whereas debt principle relief does not have a significant impact.

Keywords: debt relief, developing countries, HIPC, poverty, system GMM estimator

Procedia PDF Downloads 402
18209 Design and Creation of a BCI Videogame for Training and Measure of Sustained Attention in Children with ADHD

Authors: John E. Muñoz, Jose F. Lopez, David S. Lopez

Abstract:

Attention Deficit Hyperactivity Disorder (ADHD) is a disorder that affects 1 out of 5 Colombian children, converting into a real public health problem in the country. Conventional treatments such as medication and neuropsychological therapy have been proved to be insufficient in order to decrease high incidence levels of ADHD in the principal Colombian cities. This work demonstrates a design and development of a videogame that uses a brain computer interface not only to serve as an input device but also as a tool to monitor neurophysiologic signal. The video game named “The Harvest Challenge” puts a cultural scene of a Colombian coffee grower in its context, where a player can use his/her avatar in three mini games created in order to reinforce four fundamental aspects: i) waiting ability, ii) planning ability, iii) ability to follow instructions and iv) ability to achieve objectives. The details of this collaborative designing process of the multimedia tool according to the exact clinic necessities and the description of interaction proposals are presented through the mental stages of attention and relaxation. The final videogame is presented as a tool for sustained attention training in children with ADHD using as an action mechanism the neuromodulation of Beta and Theta waves through an electrode located in the central part of the front lobe of the brain. The processing of an electroencephalographic signal is produced automatically inside the videogame allowing to generate a report of the theta/beta ratio evolution - a biological marker, which has been demonstrated to be a sufficient measure to discriminate of children with deficit and without.

Keywords: BCI, neuromodulation, ADHD, videogame, neurofeedback, theta/beta ratio

Procedia PDF Downloads 372