Search results for: layered security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3141

Search results for: layered security

531 Safeguarding the Construction Industry: Interrogating and Mitigating Emerging Risks from AI in Construction

Authors: Abdelrhman Elagez, Rolla Monib

Abstract:

This empirical study investigates the observed risks associated with adopting Artificial Intelligence (AI) technologies in the construction industry and proposes potential mitigation strategies. While AI has transformed several industries, the construction industry is slowly adopting advanced technologies like AI, introducing new risks that lack critical analysis in the current literature. A comprehensive literature review identified a research gap, highlighting the lack of critical analysis of risks and the need for a framework to measure and mitigate the risks of AI implementation in the construction industry. Consequently, an online survey was conducted with 24 project managers and construction professionals, possessing experience ranging from 1 to 30 years (with an average of 6.38 years), to gather industry perspectives and concerns relating to AI integration. The survey results yielded several significant findings. Firstly, respondents exhibited a moderate level of familiarity (66.67%) with AI technologies, while the industry's readiness for AI deployment and current usage rates remained low at 2.72 out of 5. Secondly, the top-ranked barriers to AI adoption were identified as lack of awareness, insufficient knowledge and skills, data quality concerns, high implementation costs, absence of prior case studies, and the uncertainty of outcomes. Thirdly, the most significant risks associated with AI use in construction were perceived to be a lack of human control (decision-making), accountability, algorithm bias, data security/privacy, and lack of legislation and regulations. Additionally, the participants acknowledged the value of factors such as education, training, organizational support, and communication in facilitating AI integration within the industry. These findings emphasize the necessity for tailored risk assessment frameworks, guidelines, and governance principles to address the identified risks and promote the responsible adoption of AI technologies in the construction sector.

Keywords: risk management, construction, artificial intelligence, technology

Procedia PDF Downloads 96
530 Detection of Resistive Faults in Medium Voltage Overhead Feeders

Authors: Mubarak Suliman, Mohamed Hassan

Abstract:

Detection of downed conductors occurring with high fault resistance (reaching kilo-ohms) has always been a challenge, especially in countries like Saudi Arabia, on which earth resistivity is very high in general (reaching more than 1000 Ω-meter). The new approaches for the detection of resistive and high impedance faults are based on the analysis of the fault current waveform. These methods are still under research and development, and they are currently lacking security and dependability. The other approach is communication-based solutions which depends on voltage measurement at the end of overhead line branches and communicate the measured signals to substation feeder relay or a central control center. However, such a detection method is costly and depends on the availability of communication medium and infrastructure. The main objective of this research is to utilize the available standard protection schemes to increase the probability of detection of downed conductors occurring with a low magnitude of fault currents and at the same time avoiding unwanted tripping in healthy conditions and feeders. By specifying the operating region of the faulty feeder, use of tripping curve for discrimination between faulty and healthy feeders, and with proper selection of core balance current transformer (CBCT) and voltage transformers with fewer measurement errors, it is possible to set the pick-up of sensitive earth fault current to minimum values of few amps (i.e., Pick-up Settings = 3 A or 4 A, …) for the detection of earth faults with fault resistance more than (1 - 2 kΩ) for 13.8kV overhead network and more than (3-4) kΩ fault resistance in 33kV overhead network. By implementation of the outcomes of this study, the probability of detection of downed conductors is increased by the utilization of existing schemes (i.e., Directional Sensitive Earth Fault Protection).

Keywords: sensitive earth fault, zero sequence current, grounded system, resistive fault detection, healthy feeder

Procedia PDF Downloads 115
529 Thriving Private-Community Partnerships in Ecotourism: Perspectives from Fiji’s Upper Navua Conservation Area

Authors: Jeremy Schultz, Kelly Bricker

Abstract:

Ecotourism has proven itself to be a forerunner in the advancement of environmental conservation all the while supporting cultural tradition, uniqueness, and pride among indigenous communities. Successful private-community partnerships associated with ecotourism operations are vital to the overall prosperity of both the businesses and the local communities. Such accomplishments can be seen through numerous livelihood goals including income, food security, health, reduced vulnerability, governance, and empowerment. Private-community partnerships also support global initiatives such as the sustainable development goals and sustainable development frameworks including those proposed by the United Nations World Tourism Organization (WTO). Understanding such partnerships assists not only large organizations such as the WTO, but it also benefits smaller ecotourism operators and entrepreneurs who are trying to achieve their sustainable tourism development goals. This study examined the partnership between an ecotourism company (Rivers Fiji) and two rural villages located in Fiji’s Upper Navua Conservation Area. Focus groups were conducted in each village. Observation journals were also used to record conversations outside of the focus groups. Data were thematically organized and analyzed to offer researcher interpretations and understandings. This research supported the notion that respectful and emboldening partnerships between communities and private enterprise are vital to the composition of successful ecotourism operations that support sustainable development protocol. Understanding these partnerships can assist in shaping future ecotourism development and re-molding existing businesses. This study has offered an example of a thriving partnership through community input and critical researcher analysis. Research has identified six contributing factors to successful ecotourism partnerships, and this study provides additional support to that framework.

Keywords: community partnerships, conservation areas, ecotourism, Fiji, sustainability

Procedia PDF Downloads 135
528 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward

Authors: Ahmad Almaududy Amri

Abstract:

Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.

Keywords: piracy, Southeast Asia, maritime security, legal frameworks

Procedia PDF Downloads 502
527 Indian Bankruptcy Code 2016: Impact On Cross-Border Insolvency, an Analysis

Authors: Astha Sinha, Anjali Kanagali

Abstract:

India has been tackling with less than sophisticated legislations when it comes to recovery of debt and bankruptcy situations for a while now. There were multiple overlapping laws and adjudication forums dealing with financial failures and insolvency of companies/individuals in India without really aiding the timely recover of defaulted assets. It remained dicey for businesses to invest in India since there was a lack of legal and institutional machinery for dealing with debt defaults as per the global standards. After much deliberation, the Indian Draft Insolvency code received the presidential assent on May 28, 2016 bringing the Bankruptcy and Insolvency Code, 2016 into existence. The Code is expected to bring about great progress for the country and specifically has the two standout developments. The first is that it calls for resolution of corporate insolvency within a period of 180 days extendable by 90 days hence bringing about security in the minds of investors. Second is that it calls for the creation of a new class of insolvency professionals whose primary function shall be helping sick companies and banks with their takeovers, provides for setting up an Insolvency and Bankruptcy Board to regulate the same and provides for a two stage process of liquidation. The Code is estimated to help India move up its ranking on the World Bank’s ease of doing business index. It is currently ranked at the 130th position lower than some of the sub-saharan African countries. Besides this, however, there are various areas in which the Code falls short such as lack of provisions for aiding the issue of cross-border insolvency, impact on Medium and Small Enterprises in India etc. This paper aims to analyze the provisions of the new Bankruptcy and Insolvency Code, 2016 and its contribution in making India a more desirable location for doing business. It shall also emphasize on the cross-border insolvency issues, practices followed by other countries to resolve the same and the way forward for India to strengthen its Bankruptcy and Insolvency framework.

Keywords: bankruptcy and insolvency code 2016, cross-border insolvency provisions in the 2016 code, Ease of doing business and bankruptcy code, highlights of the new Indian bankruptcy code 2016

Procedia PDF Downloads 267
526 Interactive IoT-Blockchain System for Big Data Processing

Authors: Abdallah Al-ZoubI, Mamoun Dmour

Abstract:

The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.

Keywords: IoT devices, blockchain, Ethereum, big data

Procedia PDF Downloads 147
525 Assimilating Remote Sensing Data Into Crop Models: A Global Systematic Review

Authors: Luleka Dlamini, Olivier Crespo, Jos van Dam

Abstract:

Accurately estimating crop growth and yield is pivotal for timely sustainable agricultural management and ensuring food security. Crop models and remote sensing can complement each other and form a robust analysis tool to improve crop growth and yield estimations when combined. This study thus aims to systematically evaluate how research that exclusively focuses on assimilating RS data into crop models varies among countries, crops, data assimilation methods, and farming conditions. A strict search string was applied in the Scopus and Web of Science databases, and 497 potential publications were obtained. After screening for relevance with predefined inclusion/exclusion criteria, 123 publications were considered in the final review. Results indicate that over 81% of the studies were conducted in countries associated with high socio-economic and technological advancement, mainly China, the United States of America, France, Germany, and Italy. Many of these studies integrated MODIS or Landsat data into WOFOST to improve crop growth and yield estimation of staple crops at the field and regional scales. Most studies use recalibration or updating methods alongside various algorithms to assimilate remotely sensed leaf area index into crop models. However, these methods cannot account for the uncertainties in remote sensing observations and the crop model itself. l. Over 85% of the studies were based on commercial and irrigated farming systems. Despite a great global interest in data assimilation into crop models, limited research has been conducted in resource- and data-limited regions like Africa. We foresee a great potential for such application in those conditions. Hence facilitating and expanding the use of such an approach, from which developing farming communities could benefit.

Keywords: crop models, remote sensing, data assimilation, crop yield estimation

Procedia PDF Downloads 129
524 Assimilating Remote Sensing Data into Crop Models: A Global Systematic Review

Authors: Luleka Dlamini, Olivier Crespo, Jos van Dam

Abstract:

Accurately estimating crop growth and yield is pivotal for timely sustainable agricultural management and ensuring food security. Crop models and remote sensing can complement each other and form a robust analysis tool to improve crop growth and yield estimations when combined. This study thus aims to systematically evaluate how research that exclusively focuses on assimilating RS data into crop models varies among countries, crops, data assimilation methods, and farming conditions. A strict search string was applied in the Scopus and Web of Science databases, and 497 potential publications were obtained. After screening for relevance with predefined inclusion/exclusion criteria, 123 publications were considered in the final review. Results indicate that over 81% of the studies were conducted in countries associated with high socio-economic and technological advancement, mainly China, the United States of America, France, Germany, and Italy. Many of these studies integrated MODIS or Landsat data into WOFOST to improve crop growth and yield estimation of staple crops at the field and regional scales. Most studies use recalibration or updating methods alongside various algorithms to assimilate remotely sensed leaf area index into crop models. However, these methods cannot account for the uncertainties in remote sensing observations and the crop model itself. l. Over 85% of the studies were based on commercial and irrigated farming systems. Despite a great global interest in data assimilation into crop models, limited research has been conducted in resource- and data-limited regions like Africa. We foresee a great potential for such application in those conditions. Hence facilitating and expanding the use of such an approach, from which developing farming communities could benefit.

Keywords: crop models, remote sensing, data assimilation, crop yield estimation

Procedia PDF Downloads 80
523 Valorisation of Mango Seed: Response Surface Methodology Based Optimization of Starch Extraction from Mango Seeds

Authors: Tamrat Tesfaye, Bruce Sithole

Abstract:

Box-Behnken Response surface methodology was used to determine the optimum processing conditions that give maximum extraction yield and whiteness index from mango seed. The steeping time ranges from 2 to 12 hours and slurring of the steeped seed in sodium metabisulphite solution (0.1 to 0.5 w/v) was carried out. Experiments were designed according to Box-Behnken Design with these three factors and a total of 15 runs experimental variables of were analyzed. At linear level, the concentration of sodium metabisulphite had significant positive influence on percentage yield and whiteness index at p<0.05. At quadratic level, sodium metabisulphite concentration and sodium metabisulphite concentration2 had a significant negative influence on starch yield; sodium metabisulphite concentration and steeping time*temperature had significant (p<0.05) positive influence on whiteness index. The adjusted R2 above 0.8 for starch yield (0.906465) and whiteness index (0.909268) showed a good fit of the model with the experimental data. The optimum sodium metabisulphite concentration, steeping hours, and temperature for starch isolation with maximum starch yield (66.428%) and whiteness index (85%) as set goals for optimization with the desirability of 0.91939 was 0.255w/v concentration, 2hrs and 50 °C respectively. The determined experimental value of each response based on optimal condition was statistically in accordance with predicted levels at p<0.05. The Mango seeds are the by-products obtained during mango processing and possess disposal problem if not handled properly. The substitution of food based sizing agents with mango seed starch can contribute as pertinent resource deployment for value-added product manufacturing and waste utilization which might play significance role of food security in Ethiopia.

Keywords: mango, synthetic sizing agent, starch, extraction, textile, sizing

Procedia PDF Downloads 230
522 Tourism as Benefactor to Peace amidst the Structural Conflict: An Exploratory Case Study of Nepal

Authors: Pranil Kumar Upadhayaya

Abstract:

While peace is dividend to tourism, tourism can also be a vital force for world peace. The existing body of knowledge on a tripartite complex nexus between tourism, peace and conflict reveals that tourism is benefactor to peace and sensitive to conflict. By contextualizing the ongoing sporadic structural conflict in the transitional phase in the aftermath of a decade long (1996-2006), Maoist armed conflict in Nepal, the purpose of this study is to explore the potentials of tourism in peace-building. The outcomes of this research paper is based on the mixed methods of research (qualitative and quantitative). Though the armed conflict ended with the comprehensive peace agreement in 2006 but there is constant manifestations of non-violent structural conflicts, which continue to threaten the sustainability of tourism industry. With the persistent application of coping strategies, tourism is found resilient during the ongoing structural political conflict. The strong coping abilities of the private sector of tourism industry have also intersected with peace-building efforts with more reactive and less proactive (pro-peace) engagements. This paper ascertains about the application of the ‘theory of tourism security’ by Nepalese tourism industry while coping with conflict and reviving, and sustaining. It reveals that the multiple verities of tourism at present has heterogeneous degree of peace potentials. The opportunities of ‘peace through tourism’ can be promoted subject to its molding with responsible, sustainable and participatory characteristics. This paper comes out with pragmatic policy recommendations for strengthening the position of tourism as a true peace-builder: (a) a broad shift from mainstream conventional tourism to the community based rural with local participation and ownership to fulfill Nepal’s potentials for peace, and (b) building and applications of the managerial and operational codes of conducts for owners and workers (labor unions) at all tourism enterprises and strengthen their practices.

Keywords: code of conduct, community based tourism, conflict, peace-building, tourism

Procedia PDF Downloads 264
521 Building and Development of the Stock Market Institutional Infrastructure in Russia

Authors: Irina Bondarenko, Olga Vandina

Abstract:

The theory of evolutionary economics is the basis for preparation and application of methods forming the stock market infrastructure development concept. The authors believe that the basis for the process of formation and development of the stock market model infrastructure in Russia is the theory of large systems. This theory considers the financial market infrastructure as a whole on the basis of macroeconomic approach with the further definition of its aims and objectives. Evaluation of the prospects for interaction of securities market institutions will enable identifying the problems associated with the development of this system. The interaction of elements of the stock market infrastructure allows to reduce the costs and time of transactions, thereby freeing up resources of market participants for more efficient operation. Thus, methodology of the transaction analysis allows to determine the financial infrastructure as a set of specialized institutions that form a modern quasi-stable system. The financial infrastructure, based on international standards, should include trading systems, regulatory and supervisory bodies, rating agencies, settlement, clearing and depository organizations. Distribution of financial assets, reducing the magnitude of transaction costs, increased transparency of the market are promising tasks in the solution for questions of services level and quality increase provided by institutions of the securities market financial infrastructure. In order to improve the efficiency of the regulatory system, it is necessary to provide "standards" for all market participants. The development of a clear regulation for the barrier to the stock market entry and exit, provision of conditions for the development and implementation of new laws regulating the activities of participants in the securities market, as well as formulation of proposals aimed at minimizing risks and costs, will enable the achievement of positive results. The latter will be manifested in increasing the level of market participant security and, accordingly, the attractiveness of this market for investors and issuers.

Keywords: institutional infrastructure, financial assets, regulatory system, stock market, transparency of the market

Procedia PDF Downloads 133
520 The Vulnerability of Farmers in Valencia Negros Oriental to Climate Change: El Niño Phenomenon and Malnutrition

Authors: J. K. Pis-An

Abstract:

Objective: The purpose of the study was to examine the vulnerability of farmers to the effects of climate change, specifically the El Niño phenomenon was felt in the Philippines in 2009-2010. Methods: KAP Survey determines behavioral response to vulnerability to the effects of El Niño. Body Mass Index: Dietary Assessment using 24-hour food recall. Results: 75% of the respondents claimed that crop significantly decreased during drought. Indications that households of farmers are large where 51.6% are composed of 6-10 family members with 68% annual incomes below Php 100,00. Anthropometric assessment showed that the prevalence of Chronic Energy Deficiency Grade 1 among females 17% and 28.57% for low normal. While male body mass index result for chronic energy deficiency grade 1 10%, low normal 18.33% and and obese grade 1, 31.67%. Dietary assessment of macronutrient intake of carbohydrates, protein, and fat 31.6 % among respondents are below recommended amounts. Micronutrient deficiency of calcium, iron, vit. A, thiamine, riboflavin, niacin, and Vit. C. Conclusion: Majority of the rural populations are engaged into farming livelihood that makes up the backbone of their economic growth. Placing the current nutritional status of the farmers in the context of food security, there are reasons to believe that the status will go for worse if the extreme climatic conditions will once again prevail in the region. Farmers rely primarily on home grown crops for their food supply, a reduction in farm production during drought is expected to adversely affect dietary intake. The local government therefore institute programs to increase food resiliency and to prioritize health of the population as the moving force for productivity and development.

Keywords: world health organization, united nation framework convention on climate change, anthropometric, macronutrient, micronutrient

Procedia PDF Downloads 443
519 Determinants of Food Insecurity Among Smallholder Farming Households in Southwest Area of Nigeria

Authors: Adesomoju O. A., E. A. Onemolease, G. O. Igene

Abstract:

The study analyzed the determinants of food insecurity among smallholder farming households in the Southwestern part of Nigeria with Ondo and Osun States in focus. Multi-stage sampling procedures were employed to gather data from 389 farming households (194 from Ondo State and 195 from Osun State) spread across 4 agricultural zones, 8 local governments, and 24 communities. The data was analyzed using descriptive statistics, Ordinal regression, and Friedman test. Results revealed the average age of the respondents was 47 years with majority being male 63.75% and married 82.26% and having an household size of 6. Most household heads were educated (94.09%), engaged in farming for about 19 years, and do not belong to cooperatives (73.26%). Respondents derived income from both farming and non-farm activities with the average farm income being N216,066.8/annum and non-farm income being about N360,000/annum. Multiple technologies were adopted by respondents such as application of herbicides (77.63%), pesticides (73.26%) and fertilizers (66.58%). Using the FANTA Cornel model, food insecurity was prevalent in the study area with the majority (61.44%) of the households being severely food insecure, and 35.73% being moderately food insecure. In comparison, 1.80% and 1.03% were food-secured and mildly food insecure. The most significant constraints to food security among the farming households were the inability to access credit (mean rank = 8.78), poor storage infrastructure (8.57), inadequate capital (8.56), and high cost of farm chemicals (8.35). Significant factors related to food insecurity among the farming households were age (b = -0.059), education (b = -0.376), family size (b = 0.197), adoption of technology (b = -0.198), farm income (b = -0.335), association membership (b = -0.999), engagement in non-farm activities (b = -1.538), and access to credit (b = -0.853). Linking farmers' groups to credit institutions and input suppliers was proposed.

Keywords: food insecurity, FANTA Cornel, Ondo, Osun, Nigeria, Southwest, Livelihood

Procedia PDF Downloads 29
518 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate

Authors: Susan Diamond

Abstract:

Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare. 

Keywords: deep learning, machine learning, cognitive computing, model training

Procedia PDF Downloads 207
517 AquaCrop Model Simulation for Water Productivity of Teff (Eragrostic tef): A Case Study in the Central Rift Valley of Ethiopia

Authors: Yenesew Mengiste Yihun, Abraham Mehari Haile, Teklu Erkossa, Bart Schultz

Abstract:

Teff (Eragrostic tef) is a staple food in Ethiopia. The local and international demand for the crop is ever increasing pushing the current price five times compared with that in 2006. To meet this escalating demand increasing production including using irrigation is imperative. Optimum application of irrigation water, especially in semi-arid areas is profoundly important. AquaCrop model application in irrigation water scheduling and simulation of water productivity helps both irrigation planners and agricultural water managers. This paper presents simulation and evaluation of AquaCrop model in optimizing the yield and biomass response to variation in timing and rate of irrigation water application. Canopy expansion, canopy senescence and harvest index are the key physiological processes sensitive to water stress. For full irrigation water application treatment there was a strong relationship between the measured and simulated canopy and biomass with r2 and d values of 0.87 and 0.96 for canopy and 0.97 and 0.74 for biomass, respectively. However, the model under estimated the simulated yield and biomass for higher water stress level. For treatment receiving full irrigation the harvest index value obtained were 29%. The harvest index value shows generally a decreasing trend under water stress condition. AquaCrop model calibration and validation using the dry season field experiments of 2010/2011 and 2011/2012 shows that AquaCrop adequately simulated the yield response to different irrigation water scenarios. We conclude that the AquaCrop model can be used in irrigation water scheduling and optimizing water productivity of Teff grown under water scarce semi-arid conditions.

Keywords: AquaCrop, climate smart agriculture, simulation, teff, water security, water stress regions

Procedia PDF Downloads 401
516 Education as a Tool for Counterterrorism to Promote Peace and Social Justice: The Role of Sheikh Zayed Islamic Centre Pakistan

Authors: Ishtiaq Ahmad Gondal, Mubasher Hussain

Abstract:

Although the world always has spent a lot to counter the terror, thousands of millions of dollars have been spent in this regard after 9/11 that result to thwart some dangerous plots of terrorists. It is also un-ignorable that the terrorists, keeping the counterterrorist actions in their mind, always planned new ways for their operations, yet there is one thing still common in most terrorists' attacks: to use the label of religion, regardless any specific religion, in any form. The terrorism, in past few years, has also hit state's security, its consistency and coherence for achieving their cultural, political and military objectives. So, if they are not treated harshly for making the people's minds and their society dirty they will continue spreading chaos, anarchy and destruction among the ignorant and innocent people. Australia is doing its best to eliminate terrorism by using different tools such as by educating people and reducing poverty. There is still need to improve the tool of education as it can be used as one of the most effective tools to counter the terrorism. It is, as this paper will highlight, the need of contemporary time for establishing some high level educational centers that can educate people and keep them safe from any kind of terror incident. This study also concluded that common man, to keep himself saved from such activities and incidents, can be educated through public awareness movements and campaigns on media and at social gatherings. There is, according to the study, a need to reorganize the curriculum taught in different educational institutions especially in Islamic Schools (Madāris) that are assumed by some western writers as place of extremists, for the better understanding of moral and social obligations, fundamental rights, religious beliefs as well as cultural and social values to promote social justice and equality. This paper is an attempt to show the role of the Sheikh Zayed Islamic Centre in this regard.

Keywords: social justice, counterterrorism, educational policy, religion, peace, terrorism

Procedia PDF Downloads 110
515 DNA of Hibiscus sabdariffa Damaged by Radiation from 900 MHz GSM Antenna

Authors: A. O. Oluwajobi, O. A. Falusi, N. A. Zubbair, T. Owoeye, F. Ladejobi, M. C. Dangana, A. Abubakar

Abstract:

The technology of mobile telephony has positively enhanced human life and reports on the bio safety of the radiation from their antennae have been contradictory, leading to serious litigations and violent protests by residents in several parts of the world. The crave for more information, as requested by WHO in order to resolve this issue, formed the basis for this study on the effect of the radiation from 900 MHz GSM antenna on the DNA of Hibiscus sabdariffa. Seeds of H. sabdariffa were raised in pots placed in three replicates at 100, 200, 300 and 400 metres from the GSM antennae in three selected test locations and a control where there was no GSM signal. Temperature (˚C) and the relative humidity (%) of study sites were measured for the period of study (24 weeks). Fresh young leaves were harvested from each plant at two, eight and twenty-four weeks after sowing and the DNA extracts were subjected to RAPD-PCR analyses. There were no significant differences between the weather conditions (temperature and relative humidity) in all the study locations. However, significant differences were observed in the intensities of radiations between the control (less than 0.02 V/m) and the test (0.40-1.01 V/m) locations. Data obtained showed that DNA of samples exposed to rays from GSM antenna had various levels of distortions, estimated at 91.67%. Distortions occurred in 58.33% of the samples between 2-8 weeks of exposure while 33.33% of the samples were distorted between 8-24 weeks exposure. Approximately 8.33% of the samples did not show distortions in DNA while 33.33% of the samples had their DNA damaged twice, both at 8 and at 24 weeks of exposure. The study showed that radiation from the 900 MHz GSM antenna is potent enough to cause distortions to DNA of H. sabdariffa even within 2-8 weeks of exposure. DNA damage was also independent of the distance from the antenna. These observations would qualify emissions from GSM mast as environmental hazard to the existence of plant biodiversities and all life forms in general. These results will trigger efforts to prevent further erosion of plant genetic resources which have been threatening food security and also the risks posed to living organisms, thereby making our environment very safe for our existence while we still continue to enjoy the benefits of the GSM technology.

Keywords: damage, DNA, GSM antenna, radiation

Procedia PDF Downloads 338
514 Linking Temporal Changes of Climate Factors with Staple Cereal Yields in Southern Burkina Faso

Authors: Pius Borona, Cheikh Mbow, Issa Ouedraogo

Abstract:

In the Sahel, climate variability has been associated with a complex web of direct and indirect impacts. This natural phenomenon has been an impediment to agro-pastoral communities who experience uncertainty while involving in farming activities which is also their key source of livelihood. In this scenario, the role of climate variability in influencing the performance, quantity and quality of staple cereals yields, vital for food and nutrition security has been a topic of importance. This response of crops and subsequent yield variability is also a subject of immense debate due to the complexity of crop development at different stages. This complexity is further compounded by influence of slowly changing non-climatic factors. With these challenges in mind, the present paper initially explores the occurrence of climate variability at an inter annual and inter decadal level in South Burkina Faso. This is evidenced by variation of the total annual rainfall and the number of rainy days among other climatic descriptors. Further, it is shown how district-scale cereal yields in the study area including maize, sorghum and millet casually associate variably to the inter-annual variation of selected climate variables. Statistical models show that the three cereals widely depict sensitivity to the length of the growing period and total dry days in the growing season. Maize yields on the other hand relate strongly to the rainfall amount variation (R2=51.8%) showing high moisture dependence during critical growth stages. Our conclusions emphasize on adoption of efficient water utilization platforms especially those that have evidently increased yields and strengthening of forecasts dissemination.

Keywords: climate variability, cereal yields, seasonality, rain fed farming, Burkina Faso, rainfall

Procedia PDF Downloads 202
513 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender

Authors: Velly Anatasia

Abstract:

In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.

Keywords: Internet shopping, age groups, gender, income, electronic commerce

Procedia PDF Downloads 335
512 Reality Shock Affecting the Motivation to Work of New Flight Attendants: An Exploratory Qualitative Study of Flight Attendants Who Left Their Jobs Early

Authors: Hiromi Takafuji

Abstract:

Flight attendant:FA is one of popular occupation, especially in Asian countries, and the decision to be hired is made after clearing a high multiplier. On the other hand, immediately after joining the company, they experience unique stress due to the fact that the organization requires them to perform security and customer service duties in a highly specialized and limited space and time. As a result, despite the high level of difficulty in joining the company, many new recruits retire early at a high rate. It is commonly said that 30% of new graduates leave the company within three years in Japan and speculated that Reality Shock:RS is one of the causes of this. RS is that newcomers experience refers to the stress caused by the difference between pre-employment expectations and post-employment reality. The purpose of this study was to elucidate the mechanism by which the expertise required of new FA and the expectation of expertise held by each of them cause reality shock, which affects motivation and the decision to leave. This study identified the professionalism required of new FA and the impact of that expectation for professionalism on RS through an exploratory study of the experiences and psychological processes of FA who left within three years. Semi-structured in-depth interviews were conducted with five FA who left a major Japanese airline at an early stage, and their experiences were categorized, integrated, and classified by qualitative content analysis. They were chosen under a number of controlled conditions. Then two major findings emerged: first, that pre-employment expectations defining RS were hierarchical, and second, that training amplified expectations of professionalism, which strongly influenced early turnover. From these, this study generated a model of RS generative process model of FA that expectations are hierarchical and influential. This could contribute to the prevention of mental health deterioration by reality shock among new FA.

Keywords: reality shock, flight attendant, early turnover, qualitative study

Procedia PDF Downloads 81
511 Preventing Violent Extremism in Mozambique and Tanzania: A Survey to Measure Community Resilience

Authors: L. Freeman, D. Bax, V. K. Sapong

Abstract:

Community-based, preventative approaches to violent extremism may be effective and yet remain an underutilised method. In a realm where security approaches dominate, with the focus on countering violence extremism and combatting radicalisation, community resilience programming remains sparse. This paper will present a survey tool that aims to measure the risk and protective factors that can lead to violent extremism in Mozambique and Tanzania. Conducted in four districts in the Cabo Delgado region of Mozambique and one district in Pwani, Tanzania, the survey uses a combination of BRAVE-14, Afrocentric and context-specific questions in order to more fully understand community resilience opportunities and challenges in preventing and countering violent extremism. Developed in Australia and Canada to measure radicalisation risks in individuals and communities, BRAVE-14 is a tool not yet applied in the African continent. Given the emerging threat of Islamic extremism in Northern Mozambique and Eastern Tanzania, which both experience a combination of socio-political exclusion, resource marginalisation and religious/ideological motivations, the development of the survey is timely and fills a much-needed information gap in these regions. Not only have these Islamist groups succeeded in tapping into the grievances of communities by radicalising and recruiting individuals, but their presence in these regions has been characterised by extreme forms of violence, leaving isolated communities vulnerable to attack. The expected result of these findings will facilitate the contextualisation and comparison of the protective and risk factors that inhibit or promote the radicalisation of the youth in these communities. In identifying sources of resilience and vulnerability, this study emphasises the implementation of context-specific intervention programming and provides a strong research tool for understanding youth and community resilience to violent extremism.

Keywords: community resilience, Mozambique, preventing violent extremism, radicalisation, Tanzania

Procedia PDF Downloads 130
510 Impacts of Ibeju - Lekki New Town on Neighbouring Residents of Ibeju, Lagos Nigeria

Authors: Abolade Olajoke, Adigun Folasade Oyenike, Odunjo Oluronke Omolola Olaleye, Babajide Rotimi

Abstract:

Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%). Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment. Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%) Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment.

Keywords: new town, urbanization, infrastructure boundary

Procedia PDF Downloads 409
509 The Effectiveness of Tehran Municipality's Transformation of a Metro Station into Pedestrian-Friendly Public Spaces

Authors: Homa Hedayat

Abstract:

Public spaces have been a central concern of urban planners for centuries but have been neglected for a long time. In the modernist planning, the focus has been on the requirements of cars rather than the needs and expectations of pedestrians, and therefore, cities have lost many qualities. Urban public space is a space within the city area which is accessible to all people and is the ground for their activity. People’s public life occurs in urban public spaces in a complex set of forms and functions. These spaces must facilitate diverse behavior, uses, and activities such as shopping, walking, conversation, entertainment, relaxation or even passing the time during festivities and events. One of the public spaces is the surrounding space of public transportation stations. Subway stations, although potentially encompass many different groups of people accommodate few social interactions. Making the surrounding areas of subway stations pedestrian-oriented, potentially increases the socialization capacity. The Sadeghieh Subway Station can be considered as the most important subway station in Tehran, which on the one hand is the rail port of Tehran's western entrance, and on the other is the port for railway journeys inside the city. The main concern of this study is to assess the success or failure of the interventions made by the municipality for changing the surrounding area of the Sadeghieh Subway Station into a pedestrian-oriented space and examine the amount of the area's improvement into a desirable space. The method used in this study is surveying, in which the data were collected using a questionnaire and interview. The study's population is all people who use Sadeghieh Subway, and the sample size for the study was 140 subjects. Using parametric one-sample t-test, we found improvement in factors such as transportation, security, pedestrian infrastructure, vitality and climate comfort. However, there was no improvement in mix use, recreational activity, readability.

Keywords: public space, public transportation stations, pedestrian-oriented space, socialization

Procedia PDF Downloads 207
508 Analysing the Degree of Climate Risk Perception and Response Strategies of Farm Household Typologies in Northern Ghana

Authors: David Ahiamadia, Ramilan Thiagarajah, Peter Tozer

Abstract:

In Sub Saharan Africa, farm typologies have been used as a practical way to address heterogeneity among farming systems which is mostly done by grouping farms into subsets with similar characteristics. Due to the complexity in farming systems among farm households, it is not possible to formulate policy recommendations for individual farmers. As a result, this study employs a multivariate statistical approach using Principal Component Analysis (PCA) coupled with cluster analysis to reduce heterogeneity in a 615-household data set from the Africa Rising Baseline Evaluation Survey for 25 farming communities in Northern Ghana. Variables selected for the study were mostly socio-economic, production potential, production intensity, production orientation, crop diversity, food security, resource endowments, and climate risk variables. To avoid making some individuals in the subpopulation worse off when aclimate risk intervention is broadly implemented, the findings of the study also account for diversity in climate risk perception among the different farm types identified and their response strategies towards climate risk. The climate risk variables used in this study involve the most severeclimate shock types perceived by the household, household response to climate shock type, and reason for crop failure (i.e., maize, rice, and groundnut). Eventually, four farm types, each with an adequate level of homogeneity in climate risk perception and response strategies, were identified. Farm type 1 and 3 were wealthy with a lower degree of climate risk perception compared to farm type 2 and 4. Also, relatively wealthy farmers used asset liquidation as a climate risk management strategy, whereas poor farmers resorted to engaging in spiritual activities such as prayers, sacrifices, and divine consultations.

Keywords: smallholder, households, climate risk, variables, typologies

Procedia PDF Downloads 87
507 Improving Search Engine Performance by Removing Indexes to Malicious URLs

Authors: Durga Toshniwal, Lokesh Agrawal

Abstract:

As the web continues to play an increasing role in information exchange, and conducting daily activities, computer users have become the target of miscreants which infects hosts with malware or adware for financial gains. Unfortunately, even a single visit to compromised web site enables the attacker to detect vulnerabilities in the user’s applications and force the downloading of multitude of malware binaries. We provide an approach to effectively scan the so-called drive-by downloads on the Internet. Drive-by downloads are result of URLs that attempt to exploit their visitors and cause malware to be installed and run automatically. To scan the web for malicious pages, the first step is to use a crawler to collect URLs that live on the Internet, and then to apply fast prefiltering techniques to reduce the amount of pages that are needed to be examined by precise, but slower, analysis tools (such as honey clients or antivirus programs). Although the technique is effective, it requires a substantial amount of resources. A main reason is that the crawler encounters many pages on the web that are legitimate and needs to be filtered. In this paper, to characterize the nature of this rising threat, we present implementation of a web crawler on Python, an approach to search the web more efficiently for pages that are likely to be malicious, filtering benign pages and passing remaining pages to antivirus program for detection of malwares. Our approaches starts from an initial seed of known, malicious web pages. Using these seeds, our system generates search engines queries to identify other malicious pages that are similar to the ones in the initial seed. By doing so, it leverages the crawling infrastructure of search engines to retrieve URLs that are much more likely to be malicious than a random page on the web. The results shows that this guided approach is able to identify malicious web pages more efficiently when compared to random crawling-based approaches.

Keywords: web crawler, malwares, seeds, drive-by-downloads, security

Procedia PDF Downloads 227
506 Towards an Enhanced Quality of IPTV Media Server Architecture over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

The aim of this paper is to present the QoE (Quality of Experience) IPTV SDN-based media streaming server enhanced architecture for configuring, controlling, management and provisioning the improved delivery of IPTV service application with low cost, low bandwidth, and high security. Furthermore, it is given a virtual QoE IPTV SDN-based topology to provide an improved IPTV service based on QoE Control and Management of multimedia services functionalities. Inside OpenFlow SDN Controller there are enabled in high flexibility and efficiency Service Load-Balancing Systems; based on the Loading-Balance module and based on GeoIP Service. This two Load-balancing system improve IPTV end-users Quality of Experience (QoE) with optimal management of resources greatly. Through the key functionalities of OpenFlow SDN controller, this approach produced several important features, opportunities for overcoming the critical QoE metrics for IPTV Service like achieving incredible Fast Zapping time (Channel Switching time) < 0.1 seconds. This approach enabled Easy and Powerful Transcoding system via FFMPEG encoder. It has the ability to customize streaming dimensions bitrates, latency management and maximum transfer rates ensuring delivering of IPTV streaming services (Audio and Video) in high flexibility, low bandwidth and required performance. This QoE IPTV SDN-based media streaming architecture unlike other architectures provides the possibility of Channel Exchanging between several IPTV service providers all over the word. This new functionality brings many benefits as increasing the number of TV channels received by end –users with low cost, decreasing stream failure time (Channel Failure time < 0.1 seconds) and improving the quality of streaming services.

Keywords: improved quality of experience (QoE), OpenFlow SDN controller, IPTV service application, softwarization

Procedia PDF Downloads 146
505 In Exile but Not at Peace: An Ethnography among Rwandan Army Deserters in South Africa

Authors: Florence Ncube

Abstract:

This paper examines the military and post-military experiences of soldiers who deserted from the Rwanda Defence Force (RDF) and tried to make a living in South Africa. Because they are deserters, they try to hide their military identity, yet it is simultaneously somewhat coercively ascribed to them by the Rwandan state and can put them in potential danger. The paper attends to the constructions, experiences, practices, and subjective understanding of the deserters’ being in exile to examine how, under circumstances of perceived threat, these men navigate real or perceived state-sponsored surveillance and threat in non-military settings in South Africa where they have become potential political and disciplinary targets. To make sense of the deserters’ experiences in these circumstances, the paper stitches together a number of useful theoretical concepts, including Bourdieu’s (1992) theory of practice and Vigh’s (2009; 2018) concept of social navigation because no single approach can coherently analyze the specificity of this study. Conventional post-military literature privileges an understanding of army desertion as a malignancy and somewhat problematic. Little is known about the military and post-military experiences of deserters who believe that army desertion is in fact a building block towards achieving subjective peace, even in the context of exile. The paper argues that the presence of Rwandan state agents in South Africa strips the context of the exile of its capacity to provide the deserters with peace, safety, and security. This paper recenters army desertion in analyses of militarism, soldiering, and transition in African contexts and complicates commonsense understandings of army desertion which assume that it is entirely problematic. This paper is drawn from an ethnography conducted among 30 junior-rank Rwandan army deserters exiled in Johannesburg and Cape Town. The researcher employed life histories, in-depth interviews, and deep hangouts to collect data.

Keywords: army deserter, military, identity, exile, peacebuilding, South Africa

Procedia PDF Downloads 67
504 A Convolutional Neural Network Based Vehicle Theft Detection, Location, and Reporting System

Authors: Michael Moeti, Khuliso Sigama, Thapelo Samuel Matlala

Abstract:

One of the principal challenges that the world is confronted with is insecurity. The crime rate is increasing exponentially, and protecting our physical assets especially in the motorist industry, is becoming impossible when applying our own strength. The need to develop technological solutions that detect and report theft without any human interference is inevitable. This is critical, especially for vehicle owners, to ensure theft detection and speedy identification towards recovery efforts in cases where a vehicle is missing or attempted theft is taking place. The vehicle theft detection system uses Convolutional Neural Network (CNN) to recognize the driver's face captured using an installed mobile phone device. The location identification function uses a Global Positioning System (GPS) to determine the real-time location of the vehicle. Upon identification of the location, Global System for Mobile Communications (GSM) technology is used to report or notify the vehicle owner about the whereabouts of the vehicle. The installed mobile app was implemented by making use of python as it is undoubtedly the best choice in machine learning. It allows easy access to machine learning algorithms through its widely developed library ecosystem. The graphical user interface was developed by making use of JAVA as it is better suited for mobile development. Google's online database (Firebase) was used as a means of storage for the application. The system integration test was performed using a simple percentage analysis. Sixty (60) vehicle owners participated in this study as a sample, and questionnaires were used in order to establish the acceptability of the system developed. The result indicates the efficiency of the proposed system, and consequently, the paper proposes the use of the system can effectively monitor the vehicle at any given place, even if it is driven outside its normal jurisdiction. More so, the system can be used as a database to detect, locate and report missing vehicles to different security agencies.

Keywords: CNN, location identification, tracking, GPS, GSM

Procedia PDF Downloads 162
503 A Study of Blood Alcohol Concentration in People Arrested for Various Offences and Its Demographic Pattern

Authors: Tabin Millo, Khoob Chand, Ashok Kumar Jaiswal

Abstract:

Introduction: Various kinds of violence and offences are related to alcohol consumption by the offenders. The relationship between alcohol and violence is complex. But its study is important to achieve understanding of violence as well as alcohol related behavior. This study was done to know the blood alcohol concentration in people involved in various offences and its demographic pattern. The study was carried out in the forensic toxicology laboratory, department of Forensic Medicine, All India Institute of Medical Sciences, New Delhi, India. Material and methods: The blood samples were collected from the arrested people shortly after the commission of the offence by the emergency medical officers in the emergency department and forwarded to the forensic toxicology laboratory through the investigating officer. The blood samples were collected in EDTA vial with sodium fluoride preservative. The samples were analyzed by using gas chromatography with head space (GC-HS), which is ideal for alcohol estimation. The toxicology reports were given within a week. The data of seven years (2011-17) were analyzed for its alcohol concentration, associated crimes and its demographic pattern. Analysis and conclusion: Total 280 samples were analyzed in the period of 2011-2017. All were males except one female who was a bar dancer. The maximum cases were in the age group of 21-30 years (124 cases). The type of offences involved were road traffic accidents (RTA), assault cases, drunken driving, drinking in public place, drunk on duty, sexual offence, bestiality, eve teasing, fall etc. The maximum cases were of assault (75 cases) followed by RTA (64 cases). The maximum cases were in the alcohol concentration range of 101-150mg% (58 cases) followed by 51-100mg% (52 cases). The maximum blood alcohol level detected was 391.51 mg%, belonging to a security guard found unconscious. This study shows that alcohol consumption is associated with various kinds of violence and offences in society.

Keywords: alcohol, crime, toxicology, violence

Procedia PDF Downloads 142
502 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria

Authors: Abdur Raheem, Ado Yakub

Abstract:

Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the north eastern parts have ignited violence, bloodshed, refuge exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of these social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for prompt response, encourage community and neighbourhood policing to ameliorate security challenges in Nigeria.

Keywords: social crisis, property market, economy, resources, north-eastern Nigeria

Procedia PDF Downloads 321