Search results for: security policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6057

Search results for: security policy

5697 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 387
5696 Branding Tourism Destinations; The Trending Initiatives for Edifice Image Choices of Foreign Policy

Authors: Mehtab Alam, Mudiarasan Kuppusamy, Puvaneswaran Kunaserkaran

Abstract:

The purpose of this paper is to bridge the gap and complete the relationship between tourism destinations and image branding as a choice of edifice foreign policy. Such options became a crucial component for individuals interested in leisure and travel activities. The destination management factors have been evaluated and analyzed using the primary and secondary data in a mixed-methods approach (quantitative sample of 384 and qualitative 8 semi-structured interviews at saturated point). The study chose the Environmental Management Accounting (EMA) and Image Restoration (IR) theories, along with a schematic diagram and an analytical framework supported by NVivo software 12, for two locations in Abbottabad, KPK, Pakistan: Shimla Hill and Thandiani. This incorporates the use of PLS-SEM model for assessing validity of data while SPSS for data screening of descriptive statistics. The results show that destination management's promotion of tourism has significantly improved Pakistan's state image. The use of institutional setup, environmental drivers, immigration, security, and hospitality as well as recreational initiatives on destination management is encouraged. The practical ramifications direct the heads of tourism projects, diplomats, directors, and policymakers to complete destination projects before inviting people to Pakistan. The paper provides the extent of knowledge for academic tourism circles to use tourism destinations as brand ambassadors.

Keywords: tourism, management, state image, foreign policy, image branding

Procedia PDF Downloads 39
5695 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 272
5694 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 346
5693 The Role of the Media in Foreign Policy Formulation: A Case Study of Turkey-Greece Relations from 2004 to 2011

Authors: Mohammed Kamal Alhassan

Abstract:

The closeness of Turkey to Greece has often been a cause of many disagreements between the people of the two countries. This is against the backdrop of the fact that they have many things in common. In the past, the two countries have had unhealthy relations, which threatened to cut diplomatic ties between them. The 1996 Imia/ Kardak incident and the Öcalan crisis, for instance, nearly resulted in war between them. There were events that also brought the two countries together, for instance, the 1999 earthquake. This was because many lives were lost during the disaster. It is important to note that these events were duly covered by the media in the two countries. First of all, the study intends to look at the role of the media in the formulation of foreign policy in Turkey-Greece relations. It examines the role of the media in the formulation of foreign policy with particular emphasis on agenda-setting and positioning theories of the media as the theoretical framework. Also, the study will discuss the media landscapes in Turkey and Greece, the ownership pattern of the media sector and the relationship between media organizations and the government in the two countries. Moreover, the core foreign policy objectives of the countries will be delved into. Finally, the study employs a qualitative method to critically analyze the role of the media in the formulation of foreign policy in Turkey-Greece relations. It uses the invitation of the Former Prime Minister of Greece, George Andreas Papandreou, to the Ambassadors Conference in Turkey as a case study. In the end, the analysis will prove that, indeed, the media in Greece was effective in the formulation of foreign policy in its relations with Turkey.

Keywords: media organizations, foreign policy, government, diplomacy

Procedia PDF Downloads 87
5692 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 274
5691 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 116
5690 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 184
5689 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 15
5688 Implementing Service Innovation in Public Transport Sector: Drivers and Challenges

Authors: Chaoren Lu

Abstract:

Public policy is playing as one driving force that influencing service innovation implementation in public sector. However, public policy implications cannot be automatically derived from the analyses of innovation issues, and there lacks of researches about the influences of public policy onto innovation. Moreover, innovation in service system is hard to predictable and whether policy encourages or hidden innovation is still lack of study. Especially, by given the context that multiple actors are active involving within the service delivery process in public transport sector, the complex driving forces and challenges are emerged towards the service operation. This study is aim to analysis the service innovation practices within service operating organizations to understand the drivers and challenges of service operation based on policy requirements, and where the innovation idea generating from. The case studies of Changzhou Transit Group and Nanjing Jiangnan Public Transit Group will be launched. This paper reveals the ambidexterity between top-down and bottom-up demands within the public transport service operating organizations contribute to the innovation ideas. Meanwhile, it contributes to the understanding of fundamental elements of service innovation is the new relationship creation and new way of sharing knowledge. The policy contributes to the trigger of creation of such relationship. The research question is: what are the sources of service innovation practices in local public transport system in China in in facing the policy implementation?

Keywords: public value, service innovation, public transport service, China

Procedia PDF Downloads 295
5687 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme

Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya

Abstract:

The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.

Keywords: metaverse, multifactor authentication, security, facial recognition, patten password

Procedia PDF Downloads 39
5686 Mother Tounge Based Multilingual Education Policy: Voices of Two Cities, 'The Voice of Laguna'

Authors: Cecilia Velasco, Q.

Abstract:

This study was undertaken to find out the perceived efficiency, appropriateness effectiveness, acceptability and relevance, if at all such exist, of the Mother Tongue Based Multilingual Education Policy under the K-12 Curriculum, as seen by the stakeholders who are directly affected by this policy. The researcher believed that it is right and fitting to get the views and opinions of the people directly involved and/or concerned about this education policy. The results of the study will hopefully guide lawmakers and/or policymakers to fine-tune educational policy or policies. The locale of the study was the DepEd schools in Laguna, (San Pablo City and other nearby cities). The subjects of the study were the teachers (first phase) from the public schools of Department of Education (San Pablo City), in particular and parents (second phase) from nearby cities who are the direct stakeholders of this Policy. To determine the perception of the teachers toward Mother Tongue Based Multilingual Education Policy; its acceptability, efficiency, appropriateness, effectiveness and relevance, factor analysis was used to refine the instrument (questionnaire). To find out the significant difference between the perceptions of the primary and intermediate group of teachers, including those who teach mother tongue and non-mother tongue subjects, t-test of difference between means was employed.

Keywords: DepEd, K12 curriculum, MTBMLE, stakeholders

Procedia PDF Downloads 273
5685 Military Role of Russia beyond Its National Boundary

Authors: Nipuli Gajanayake

Abstract:

The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security.

Keywords: collective security, diplomacy, international military role of Russia, international peace and security

Procedia PDF Downloads 276
5684 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 409
5683 Research on the Public Policy of Vehicle Restriction under Traffic Control

Authors: Wang Qian, Bian Cheng Xiang

Abstract:

In recent years, with the improvement of China's urbanization level, the number of urban motor vehicles has grown rapidly. As residents' daily commuting necessities, cars cause a lot of exhaust emissions and urban traffic congestion. In the "Fourteenth Five Year Plan" of China, it is proposed to strive to reach the peak of carbon dioxide emissions by 2030 and achieve carbon neutrality by 2060. Urban transport accounts for a high proportion of carbon emission sources. It is an important driving force for the realization of China's carbon peak strategy. Some cities have introduced and implemented the policy of "car restriction" to solve related urban problems by reducing the use of cars. This paper analyzes the implementation of the "automobile restriction" policy, evaluates the relevant effects of the automobile restriction policy, and discusses how to better optimize the "automobile restriction" policy in the process of urban governance.

Keywords: carbon emission, traffic jams, vehicle restrictions, evaluate

Procedia PDF Downloads 128
5682 The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria

Authors: Kaltume Kabir Sharrif

Abstract:

Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others.

Keywords: transformation, security challenges, teacher education, educational psychology

Procedia PDF Downloads 471
5681 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 396
5680 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 123
5679 Waste Prevention and Economic Policy: Policy Tools for Increasing Resource Efficiency and Savings

Authors: Sylvia Graczka

Abstract:

Waste related environmental problems are not only exploding but are also spotlighted for capacity shortages in recycling, as China announced its ban on waste imports. According to the waste hierarchy, prevention is the primary solution for waste, and also the cheapest. Waste related environmental pollution as externality puts an ever-growing burden on communities bearing the social costs. Economic policies often claim to be pro-environment, this often appears only theoretically, or at the level of principles. There are few concrete occurrences of tools in economic policies, such as green taxes, that are truly effective in stimulating the shift towards waste reduction. The paper presents theoretical economic policy tools based on literature review, and case studies on applied economic policy tools by analyzing policy papers, strategies in force, in line with ‘polluter pays’ and ‘extended producer responsibility’ principles. The study also emphasizes the differences between the broader notion of waste reduction and that of waste minimization, parallel to the difference between resource efficiency and resource savings. It also puts the issue in the context of neoclassical environmental economics and ecological economics, to present alternatives in approach. The research concludes in identifying effective economic policy tools that support the reduction of material use, and the prevention of waste. Consumer and producer awareness of waste problems and consciousness related to their choices are inevitable to make economic policy tools work effectively.

Keywords: economic policy, producer responsibility, resource efficiency, waste prevention

Procedia PDF Downloads 127
5678 Implementation of Gender Policy in the Georgian National Defence: Key Issues and Challenges

Authors: Vephkhvia Grigalashvili

Abstract:

The defense of Georgia is every citizen’s duty. The present article reviews the principles and standards of gender policy in the Georgian national defense sector. In addition, it looks at mechanisms for ensuring gender equality, going through the relevant Georgian legislation. Furthermore, this work aims to conduct a comparative analysis of defense models of Georgia, Finland, and the Baltic States in order to identify core institutional challenges. The study produced the following findings:(a) The national defense planning is based on the Total Defense approach, which implies a wide involvement of the country`s population in state defense. (b) This political act does not specify gender equality aspects of the Total Defense strategy; (c) According to the Constitution of Georgia, irrespective of gender factors, every citizen of Georgia is legally obliged to participate in state security activities. However, the state has an authority (power of choice) to decide which gender group (male or/and female citizen) must fulfill above mentioned their constitutional commitment. For instance, completion of compulsory military and reserve military services is a male citizen’s duty, whereas professional military service is equally accessible to both genders. The study concludes that effective implementation of the Total Defense concept largely depends on how Georgia uses its capabilities and human resources. Based on the statistical fact that more than 50% of the country’s population are women, Georgia has to elaborate on relevant institutional mechanisms for implementation of gender equality in the national defense organization. In this regard, it would be advisable: (i) to give the legal opportunity to women to serve in compulsory military service, and (ii) to develop labor reserve service as a part of the anti-crisis management system of Georgia.

Keywords: gender in defense organisation, gender mechanisms, gender in defense policy, gender policy

Procedia PDF Downloads 131
5677 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 35
5676 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 224
5675 Indian Diplomacy in a Post Pandemic World

Authors: Esha Banerji

Abstract:

This paper attempts an assessment of India's behaviour as a foreign policy actor amidst the COVID 19 pandemic by briefly surveying the various introductions and alterations made to India's foreign policy. First, the paper attempts to establish the key strategic pillars of Indian foreign policy after reviewing the existing works. It then proceeds to assess the prominent part played by Health Diplomacy ("Vaccine Maitri") in India's bilateral and multilateral relations during the pandemic and the role of the Indian diaspora in shaping India's foreign policy. This is followed by examining "India's Neighbourhood First policy" and the way it's been employed by the Indian government to extend India’s strategic influence during the pandemic. An empirical assessment will be done to examine the changing dynamics of India's relation with different regional groupings like SAARC, ASEAN, BIMSTEC, etc. The paper also explores the new alliances formed post-pandemic and India's role in them. This paper analyses the contemporary challenges that the largest nation in South Asia faces with the onset of a global pandemic and how Ancient Indian values like "Vasudhaiva Kutumbakam" have influenced India's foreign policy, especially during the pandemic. It also attempts to grasp the changes within the negotiation style of the Indian government, and the role played by various stakeholders in shaping India's position in the present geopolitical landscape. The study has been conducted using data collected from government records, External Affairs Ministry database, and other available literature. The paper concludes with an attempt to predict the far-reaching strategic implications that the policy, as mentioned above, may have for India.

Keywords: Indian foreign policy, COVID19, diplomacy, post pandemic world

Procedia PDF Downloads 269
5674 An Investigation on Interactions between Social Security with Police Operation and Economics in the Field of Tourism

Authors: Mohammad Mahdi Namdari, Hosein Torki

Abstract:

Security as an abstract concept, has involved human being from the beginning of creation to the present, and certainly to the future. Accordingly, battles, conflicts, challenges, legal proceedings, crimes and all issues related to human kind are associated with this concept. Today by interviewing people about their life, the security of societies and Social crimes are interviewed too. Along with the security as an infrastructure and vital concept, the economy and related issues e.g. welfare, per capita income, total government revenue, export, import and etc. is considered another infrastructure and vital concept. These two vital concepts (Security and Economic) have linked together complexly and significantly. The present study employs analytical-descriptive research method using documents and Statistics of official sources. Discovery and explanation of this mutual connection are comprising a profound and extensive research; so management, development and reform in system and relationships of the scope of this two concepts are complex and difficult. Tourism and its position in today's economy is one of the main pillars of the economy of the 21st century that maybe associate with the security and social crimes more than other pillars. Like all human activities, economy of societies and partially tourism dependent on security especially in the public and social security. On the other hand, the true economic development (generally) and the growth of the tourism industry (dedicated) are a security generating and supporting for it, because a dynamic economic infrastructure prevents the formation of centers of crime and illegal activities by providing a context for socio-economic development for all segments of society in a fair and humane. This relationship is a formula of the complexity between the two concept of economy and security. Police as a revealed or people-oriented organization in the field of security directly has linked with the economy of a community and is very effective In the face of the tourism industry. The relationship between security and national crime index, and economic indicators especially ones related to tourism is confirming above discussion that is notable. According to understanding processes about security and economic as two key and vital concepts are necessary and significant for sovereignty of governments.

Keywords: economic, police, tourism, social security

Procedia PDF Downloads 299
5673 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 66
5672 Understanding the Factors behind Graduate Employability in the United Arab Emirates

Authors: Mohammed Islam

Abstract:

Graduate employability is a well debated topic by governments, employers, and higher education institutes (HEI) across the world. Much of the focus of these debates have centred around the skills that graduates bring or should bring to the job market, a point echoed by United Arab Emirates (UAE) policy makers and employers. While some research has been carried out on graduates' employability skills, little or no attention has been paid to the forces at play in developing employability policy and its subsequent implementation. The focus of debate has been on a perceived skills gap rather than policy. Recognising a gap in the literature, this paper details a study of UAE employability policy development. Taking a social constructionist approach, this case study views policy as discursive and socially constructed through interactions with key stakeholders. It is within the myriad of interdependent socio-political factors and social practices, particularly power relationships, that this paper explores UAE policy on graduate employability. In doing so, this adds to the debate on graduate employability from the perspective of policy and explores its roots in the interaction between human activity and the ‘system’. Data was collected from two main sources: documentary review and semi-structured interviews. Policies and publicly stated rhetoric on graduate employability were analysed using Critical Discourse Analysis. Semi-structured interviews with representatives from policy makers, HEIs, and employers were reviewed through Thematic Analysis. The theoretical framework for the discussion of findings draws from social practice theories and highlights the factors at play in access to employment for UAE graduates. This case study presents a methodological approach to policy studies that can be applied beyond the context under investigation. Education policy researchers are provided with an opportunity to compare similarities and differences with their own specific contexts.

Keywords: critical discourse analysis, employability, methodology, policy, social constructionism

Procedia PDF Downloads 104
5671 An Assessment of the Role of Actors in the Medical Waste Management Policy-Making Process of Bangladesh

Authors: Md Monirul Islam, Shahaduz Zaman, Mosarraf H. Sarker

Abstract:

Context: Medical waste management (MWM) is a critical sector in Bangladesh due to its impact on human health and the environment. There is a need to assess the current policies and identify the role of policy actors in the policy formulation and implementation process. Research Aim: The study aimed to evaluate the role of policy actors in the medical waste management policy-making process in Bangladesh, identify policy gaps, and provide actionable recommendations for improvement. Methodology: The study adopted a qualitative research method and conducted key informant interviews. The data collected were analyzed using the thematic coding approach through Atlas.ti software. Findings: The study found that policies are formulated at higher administrative levels and implemented in a top-down approach. Higher-level institutions predominantly contribute to policy development, while lower-level institutions focus on implementation. However, due to negligence, ignorance, and lack of coordination, medical waste management receives insufficient attention from the actors. The study recommends the need for immediate strategies, a comprehensive action plan, regular policy updates, and inter-ministerial meetings to enhance medical waste management practices and interventions. Theoretical Importance: The research contributes to evaluating the role of policy actors in medical waste management policymaking and implementation in Bangladesh. It identifies policy gaps and provides actionable recommendations for improvement. Data Collection: The study used key informant interviews as the data collection method. Thirty-six participants were interviewed, including influential policymakers and representatives of various administrative spheres. Analysis Procedures: The data collected was analyzed using the inductive thematic analysis approach. Question Addressed: The study aimed to assess the role of policy actors in medical waste management policymaking and implementation in Bangladesh. Conclusion: In conclusion, the study provides insights into the current medical waste management policy in Bangladesh, the role of policy actors in policy formulation and implementation, and the need for improved strategies and policy updates. The findings of this study can guide future policy-making efforts to enhance medical waste management practices and interventions in Bangladesh.

Keywords: key informant, medical waste management, policy maker, qualitative study

Procedia PDF Downloads 54
5670 Microwave Security System in Museums: Design and Implementation

Authors: Dalia Elsheakh, Hala Elsadek

Abstract:

The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations.

Keywords: microwave security system, object locating system, real time locating system (RTLS), antenna array, array electronic scanning

Procedia PDF Downloads 319
5669 Contribution to the Decision-Making Process for Selecting the Suitable Maintenance Policy

Authors: Nasser Y. Mahamoud, Pierre Dehombreux, Hassan E. Robleh

Abstract:

Industrial companies may be confronted with questions about their choice of maintenance policy. This choice must be guided by several numbers of decision criteria or objectives related to their production or service activities but also to their level of development and their investment prospects. A decision-support methodology to choose a maintenance policy (corrective, systematic or conditional preventive, predictive, opportunistic or not) is proposed to facilitate this choice using the main categories of the most important decision criteria. The different steps of this methodology are illustrated using theoretical case: identification of the different maintenance alternatives, determining the structure of the most important categories of the decision criteria, assessing the different maintenance policies on to the criteria by using an ordinal preference relation, and finally ranking the different maintenance policies.

Keywords: maintenance policy, decision criteria, decision-making process, AHP

Procedia PDF Downloads 306
5668 An Examination of the Effects of Implantable Technologies on the Practices of Governmentality

Authors: Benn Van Den Ende

Abstract:

Over the last three decades, there has been an exponential increase in developments in implantable technologies such as the cardiac pacemaker, bionic prosthesis, and implantable chips. The effect of these technologies has been well researched in many areas. However, there is a lack of critical research in security studies. This paper will provide preliminary findings to an ongoing research project which aims to examine how implantable technologies effect the practices of governmentality in the context of security. It will do this by looking at the practices and techniques of governmentality along with different implantable technologies which increase, change or otherwise affect governmental practices. The preliminary research demonstrates that implantable technologies have a profound effect on the practices of governmentality, while also paving the way for further research into a potential ‘new’ form of governmentality in relation to these implantable technologies.

Keywords: critical security studies, governmentality, security theory, political theory, Foucault

Procedia PDF Downloads 160