Search results for: housing security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3323

Search results for: housing security

3173 The Eathquake Discourse as a Strategy of an Urban Renewal: A Case Study into the Karapınar Valley Regeneration Project in Eskişehir, Turkey

Authors: Cansu Civelek

Abstract:

The flexible and uneven character of neoliberalism has provided adaptation of urban strategies into the constantly changing circumstances in order to renew and reproduce the neoliberal accumulation model. Instrumentalization of catastrophic events to this end has been one of those global urban strategies. Regarding Turkey, exploitation of natural disasters has been the latest tactic of the Justice and Development Party (JDP) government to achieve radical economic goals. ‘Unhealthy’ and ‘risky’ structures of squatter settlements have often been articulated while the regenerations, expropriations, and exclusions have been sugarcoated through the discourses of ‘reintegrating the shanty zones into the cities’, ‘supplying healthy housing’, and ‘win-win’ character of the projects. Being the first regeneration project of Eskişehir, the Karapınar Regeneration Project has been initiated in 2011 by the partnership of the Odunpazarı Municipality of the JDP and the Mass Housing Organization. Discourses around the forthcoming disasters, ‘risky structures’ of the squatters, and the importance of the ‘security of life and property’ have been utilized, even though the zone is situated on a geotechnically stable area. Yet, many of the locals are worried about the payments while some have already decided to move elsewhere at the outskirts of the city.

Keywords: neoliberal urbanism, urban regeneration, illegal settlements, discourses

Procedia PDF Downloads 414
3172 The Impact of Floods and Typhoons on Housing Welfare: Case Study of Thua Thien Hue Province, Vietnam

Authors: Seyeon Lee, Suyeon Lee, Julia Rogers

Abstract:

This research investigates and records post-flood and typhoon conditions of low income housing in the Thua Thien Hue Province, Vietnam; area prone to extreme flooding in Central Vietnam. The cost of rebuilding houses after flood and typhoon has been always a burden for low income households. These costs often lead to the elimination of essential construction practices for disaster resistance. Despite relief efforts from international non-profit organizations and Vietnam government, the impacts of flood and typhoon damages to residential construction has been reoccurring to the same neighborhood annually. Notwithstanding its importance, this topic has not been systematically investigated. The study is limited to assistance provided to low income households documenting existing conditions of low income homes impacted by post flood and typhoon conditions in the Thua Thien Hue Province. The research identifies leading causes of the building failure from the natural disasters. Relief efforts and progress made since the last typhoon is documented. The quality of construction and repairs are assessed based on Home Builders Guide to Coastal Construction by Federal Emergency Management Agency. Focus group discussions and individual interviews with local residents from four different communities were conducted to get incites on repair effort by the non-profit organizations and Vietnam government, and their needs post flood and typhoon. The findings from the field study informed that many of the local people are now aware of the importance of improving housing conditions as one of the key coping strategies to withstand flood and typhoon events as it makes housing and community more resilient to future events. While there has been a remarkable improvement of housing and infrastructure with the support from the local government as well as the non-profit organizations, many households in the study areas are found to still live in weak and fragile housing conditions without gaining access to the aid to repair and strengthen the houses. Given that the major immediate recovery action taken by the local people tends to focus on repairing damaged houses, and on this ground, low-income households spend a considerable amount of their income on housing repair, providing proper and applicable construction practices will not only improve the housing condition, but also contribute to reducing poverty in Vietnam.

Keywords: disaster coping mechanism, housing welfare, low-income housing, recovery reduction

Procedia PDF Downloads 250
3171 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 197
3170 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 703
3169 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 272
3168 Daylight Performance of a Single Unit in Distinct Arrangements

Authors: Rifat Tabassoom

Abstract:

Recently multistoried housing projects are accelerating in the capital of Bangladesh- Dhaka, to house its massive population. Insufficient background research leads to a building design trend where a single unit is designed and then multiplied all through the buildings. Therefore, although having identical designs, all the units cannot perform evenly considering daylight, which also alters their household activities. This paper aims to understand if a single unit can be an optimum solution regarding daylight for a selected housing project.

Keywords: daylight, orientation, performance, simulations

Procedia PDF Downloads 93
3167 The Impact of Housing Design on the Health and Well-Being of Populations: A Case-Study of Middle-Class Families in the Metropolitan Region of Port-Au-Prince, Haiti

Authors: A. L. Verret, N. Prince, Y. Jerome, A. Bras

Abstract:

The effects of housing design on the health and well-being of populations are quite intangible. In fact, healthy housing parameters are generally difficult to establish scientifically. It is often unclear the direction of a cause-and-effect relationship between health variables and housing. However, the lack of clear and definite measurements does not entail the absence of relationship between housing, health, and well-being. Research has thus been conducted. It has mostly aimed the physical rather than the psychological or social well-being of a population, given the difficulties to establish cause-effect relationships because of the subjectivity of the psychological symptoms and of the challenge in determining the influence of other factors. That said, a strong relationship has been exposed between light and physiology. Both the nervous and endocrine systems, amongst others, are affected by different wavelengths of natural light within a building. Daylight in the workplace is indeed associated to decreased absenteeism, errors and product defects, fatigue, eyestrain, increased productivity and positive attitude. Similar associations can also be made to residential housing. Lower levels of sunlight within the home have been proven to result in impaired cognition in depressed participants of a cross-sectional case study. Moreover, minimum space (area and volume) has been linked to healthy housing and quality of life, resulting in norms and regulations for such parameters for home constructions. As a matter of fact, it is estimated that people spend the two-thirds of their lives within the home and its immediate environment. Therefore, it is possible to deduct that the health and well-being of the occupants are potentially at risk in an unhealthy housing situation. While the impact of architecture on health and well-being is acknowledged and considered somewhat crucial in various countries of the north and the south, this issue is barely raised in Haiti. In fact, little importance is given to architecture for many reasons (lack of information, lack of means, societal reflex, poverty…). However, the middle-class is known for its residential strategies and trajectories in search of better-quality homes and environments. For this reason, it would be pertinent to use this group and its strategies and trajectories to isolate the impact of housing design on the overall health and well-being. This research aims to analyze the impact of housing architecture on the health and well-being of middle-class families in the metropolitan region of Port-au-Prince. It is a case study which uses semi-structured interviews and observations as research methods. Although at an early stage, this research anticipates that homes affect their occupants both psychologically and physiologically, and consequently, public policies and the population should take into account the architectural design in the planning and construction of housing and, furthermore, cities.

Keywords: architectural design, health and well-being, middle-class housing, Port-au-Prince, Haiti

Procedia PDF Downloads 112
3166 Impact of Lifestyle and User Expectations on the Demand of Compact Living Spaces in the Home Interiors in Indian Cities

Authors: Velly Kapadia, Reenu Singh

Abstract:

This report identifies the long-term driving forces behind urbanization and the impact of compact living on both society and the home and proposes a concept to create smarter and more sustainable homes. Compact living has been trending across India as a sustainable housing solution, and the reality is that India is currently facing a housing shortage in urban areas of around 10 million units. With the rising demand for housing, urban land prices have been rising and the cost of homes. The paper explores how and why the interior design of the homes can be improved to relieve the housing demand in an environmentally, socially and economically sustainable manner. A questionnaire survey was conducted to determine living patterns, area requirements, ecological footprints, energy consumption, purchasing patterns, and various pro-environmental behaviors of people who downsize to compact homes. Quantitative research explores sustainable material choices, durability, functionality, cost, and reusability of furniture. Besides addressing the need for smart and sustainable designed compact homes, a conceptual model is proposed, including options of ideal schematic layouts for homes in urban areas. In the conclusions, suggestions to improve space planning and suitable interior entities have been made to support the fact that compact homes are an eminently practical and sensible solution for the urban citizen.

Keywords: compact living, housing shortage, lifestyle, sustainable interior design

Procedia PDF Downloads 171
3165 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 454
3164 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 412
3163 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 309
3162 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 116
3161 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 147
3160 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 399
3159 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 368
3158 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 495
3157 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 53
3156 Traditional Values and Their Adaptation in Social Housing Design: Towards a New Typology and Establishment of 'Airhouse' Standard in Malaysia

Authors: Mohd Firrdhaus Mohd Sahabuddin, Cristina Gonzalez-Longo

Abstract:

Large migration from rural areas to urban areas like Kuala Lumpur has led to some implications for economic, social and cultural development. This high population has placed enormous demand on the existing housing stocks, especially for low-income groups. However, some issues arise, one of which is overheated indoor air temperature. This problem contributes to the high-energy usage that forces huge sums of money to be spent on cooling the house by using mechanical equipment. Therefore, this study focuses on thermal comfort in social housing, and incorporates traditional values into its design to achieve a certain measurement of natural ventilation in a house. From the study, the carbon emission and energy consumption for an air-conditioned house is 67%, 66% higher than a naturally ventilated house. Therefore, this research has come up with a new typology design, which has a large exposed wall area and full-length openings on the opposite walls to increase cross ventilation. At the end of this research, the measurement of thermal comfort for a naturally ventilated building called ‘AirHouse’ has been identified.

Keywords: tropical architecture, natural ventilation, passive design, AirHouse, social housing design

Procedia PDF Downloads 650
3155 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit

Authors: Yllka Hysaj, Ylberina Hysaj Arifi

Abstract:

Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.

Keywords: migration, self-initiated expatriates, Brexit, job security

Procedia PDF Downloads 141
3154 Assessing the Resilience to Economic Shocks of the Households in Bistekville 2, Quezon City, Philippines

Authors: Maria Elisa B. Manuel

Abstract:

The Philippine housing sector is bracing challenges with the massive housing backlog and the adamant cycle of relocation, resettlement and returns to the cities of informal settler families due to the vast inaccessibility of necessities and opportunities in the past off-city housing projects. Bistekville 2 has been established as a model socialized housing project by utilizing government partnerships with private developers and individuals in the first in-city and onsite resettlement effort in the country. The study looked into the resilience of the residents to idiosyncratic economic shocks by analyzing their vulnerabilities, assets and coping strategies. The study formulated an economic resilience framework to identify how these factors that interact to build the household’s capacity to positively adapt to sudden expenses in their households. The framework is supplemented with a scale that presents the proximity of the household to resilience by identifying through its indicators whether the households are in the level of subsistence, coping, adaptive or transformative. Survey interviews were conducted with 91 households from Bistekville 2 on the components that have been identified by the framework that was processed with qualitative and quantitative processes. The study has found that the households are highly vulnerable due to their family composition and other conditions such as unhealthy loans, inconsistent amortization payment. Along with their high vulnerability, the households have inadequate strategies to anticipate shocks and primarily react to the shock. This has led to the conclusion that the households do not reflect resilience to idiosyncratic economic shocks and are still at the level of coping.

Keywords: idiosyncratic economic shocks, socialized housing, economic resilience, economic vulnerability, adaptive capacity

Procedia PDF Downloads 114
3153 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event

Procedia PDF Downloads 404
3152 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War

Authors: E. K. Linsenmayer

Abstract:

Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.

Keywords: gender inequality, politics, state security, women's security

Procedia PDF Downloads 180
3151 Vulnerability of the Rural Self-Constructed Housing with Social Programs and His Economic Impact in the South-East of Mexico

Authors: Castillo-Acevedo J, Mena-Rivero R, Silva-Poot H

Abstract:

In Mexico, as largely of the developing countries, the rural housing is a study object, since the diversity of constructive idiosyncrasies for locality, involves various factors that make it vulnerable; an important aspect of study is the progressive deterioration that is seen in the rural housing. Various social programs, contribute financial resources in the field of housing to provide support for families living in rural areas, however, they do not provide a coordination with the self-construction that is usually the way in which is built in these areas. The present study, exposes the physical situation and an economic assessment that presents the rural self-constructed housing in three rural communities in the south of the state of Quintana Roo, Mexico, which were built with funding from federal social programs. The information compilation was carried out in a period of seven months in which there was used the intentional sampling of typical cases, where the object study was the housing constructed with supports of the program “Rural Housing” between the year 2009 and 2014. Instruments were used as the interview, ballot papers of observation, ballot papers of technical verification and various measuring equipment laboratory for the classification of pathologies; for the determination of some pathologies constructive Mexican standards were applied how NMX-C-192-ONNCCE, NMX-C-111-ONNCCE, NMX-C-404-ONNCCE and finally used the software of Opus CMS ® with the help of tables of the National Consumer Price Index (CPI) for update of costs and wages according to the line of being applied in Mexico, were used for an economic valuation. The results show 11 different constructive pathologies and exposes greater presence with the 22.50% to the segregation of the concrete; the economic assessment shows that 80% of self-constructed housing, exceed the cost of construction it would have compared to a similar dwelling built by a construction company; It is also exposed to the 46.10% of the universe of study represent economic losses in materials to the social activities by houses not built. The system of self-construction used by the social programs, affect to some extent the program objectives applied in underserved areas, as implicit and additional costs affect the economic capacity of beneficiaries who invest time and effort in an activity that are not specialists, which this research provides foundations for sustainable alternatives or possibly eliminate the practice of self-construction of implemented social programs in marginalized rural communities in the south of state of Quintana Roo, Mexico.

Keywords: economic valuation, pathologies constructive, rural housing, social programs

Procedia PDF Downloads 501
3150 Correlation Analysis of Energy Use, Architectural Design and Residential Lifestyle in Japan Smart Community

Authors: Tran Le Na, Didit Novianto, Yoshiaki Ushifusa, Weijun Gao

Abstract:

This paper introduces the characteristics of Japanese residential lifestyle and Japanese Architectural housing design, meanwhile, summarizes the results from an analysis of energy use of 12 households in electric-only multi dwellings in Higashida Smart Community, Kitakyushu, Japan. Using hourly load and daily load data collected from smart meter, we explore correlations of energy use in households according to the incentive of different levels of architectural characteristics and lifestyle, following three factors: Space (Living room, Kitchen, Bedroom, Bathroom), Time (daytime and night time, weekdays and weekend) and User (Elderly, Parents, Kids). The energy consumption reports demonstrated that the essential demand of household’s response to variable factors. From that exploratory analysis, we can define the role of housing equipment layout and spatial layout in residential housing design. Likewise, determining preferred spaces and time use can help to optimize energy consumption in households. This paper contributes to the application of Smart Home Energy Management System in Smart Community in Japan and provides a good experience to other countries.

Keywords: smart community, energy efficiency, architectural housing design, residential lifestyle

Procedia PDF Downloads 177
3149 Urban Renewal, Social Housing, Relocation, and Violence in Algiers

Authors: Kahina Amal Djiar, Mouna Gharbi, Maha Messaoudene, Oumelkheir Chareb

Abstract:

Over the last decade, Algerian authorities have implemented an ambitious program of urban renewal, which includes important relocation operations. The objectives behind such strategic interventions are on the one hand, to carry out an incremental approach aiming at eradicating precarious housing and on the other hand, to diversify alternative housing options for families requiring better living spaces. It is precisely for these same purposes that the Djenan el-Hassan and Carrières Jaubert estates, which are both located in Algiers, have undergone major urban transformations. These dwelling sites were built as part of the famous "Battle of Housing", which was launched by French colonial administration in the 1950s just before the independence of Algeria in 1962. Today, the Djenan el-Hassan estate is almost entirely demolished following the relocation of 171 families. The Carrières Jaubert estate, for its part, has seen two kinds of operations. The first has been shaped by a process of urban requalification and redevelopment, which allowed some of the residents to stay on site after the transformation of most housing cells into larger apartments. The second operation has required the relocation of over 300 families to entirely newly built dwellings. Such projects of urban renewal are supposed to create new opportunities, not only in terms of local urban development, but also in terms of social perspectives for those families who are involved, either directly or indirectly, in the process of relocation. In fact, the percentage of urban violence in Algiers has increased instead. Recent events in the newly built estates show that residents are repeatedly experiencing and even instigating episodes of brutality, hostility and aggression. The objective of this paper is to examine the causes that have engendered such rise in urban violence in newly built housing estates in Algiers. This paper aims to present the findings of a recent qualitative research and highlight the way that poorly designed neighbourhood, combined with a relocation process that leaves little room for community participation, create inevitably severe social tensions.

Keywords: relocation, social housing, violence, Algiers

Procedia PDF Downloads 503
3148 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz

Authors: Homa Parmoon, Narges Hamzeh

Abstract:

Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.

Keywords: social security, damaged area, two-way ANOVA, Shiraz

Procedia PDF Downloads 111
3147 Reform of the Law Relating to Personal Property Security

Authors: Ji Lian Yap

Abstract:

This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered.

Keywords: personal property, security law, reform of the law, law

Procedia PDF Downloads 396
3146 Safety-Security Co-Engineering of Control Systems

Authors: Elena A. Troubitsyna

Abstract:

Designers of modern safety-critical control systems are increasingly relying on networking to provide the systems with advanced functionality and satisfy customer’s needs. However, networking nature of modern control systems also brings new technological challenges associated with ensuring system safety in the presence of openness and hence, potential security threats. In this paper, we propose a methodology that relies on systems-theoretic analysis to enable an integrated analysis of safety and security requirements of controlling software. We demonstrate how to create a safety case – a structured argument about system safety – with explicit representation of both safety and security goals. Our approach provides the designers with a systematic approach to analysing safety and security interdependencies while designing safety-critical control systems.

Keywords: controlling software, integrated analysis, security, safety-security co-engineering

Procedia PDF Downloads 467
3145 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 276
3144 Resource Allocation Modeling and Simulation in Border Security Application

Authors: Kai Jin, Hua Li, Qing Song

Abstract:

Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made.

Keywords: resource optimization, simulation, modeling, border security

Procedia PDF Downloads 487