Search results for: the housing security system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19498

Search results for: the housing security system

19318 Factors Affecting the Quality of Life of Residents in Low-Cost Housing in Thailand

Authors: Bundit Pungnirund

Abstract:

The objectives of this research were to study the factors affecting life quality of residents who lived in the low-cost housing in Thailand. This study employed by quantitative research and the questionnaire was used to collect the data from 400 sampled of the residents in low-cost housing projects in Thailand. The descriptive statistics and multiple regression analysis were used to analyze data. The research results revealed that economic status of residents, government’s policy on dwelling places, leadership of community leaders, environmental condition of the community, and the quality of life were rated at the good level, while the participation of residents, and the knowledge and understanding of community members were rated at the high level. Furthermore, the environmental condition, the government’s policy on dwelling places, knowledge and understanding of residents, leadership of community leaders, economic status of the residents, and participation of community members had significantly affected the quality of life of residents in the low-cost housing.

Keywords: quality of life, community leadership, community participation, low-cost housing

Procedia PDF Downloads 321
19317 Sustainability of High-Rise Affordable Housing: Critical Issues in Applying Green Building Rating Tools

Authors: Poh Im. Lim, Hillary Yee Qin. Tan

Abstract:

Nowadays, going green has become a trend, and being emphasized in the construction industry. In Malaysia, there are several green rating tools available in the industry and among these, GBI and GreenRE are considered as the most common tools adopted for residential buildings. However, being green is not equal to or making something sustainable. Being sustainable is to take economic, environmental and social aspects into consideration. This is particularly essential in the affordable housing sector as the end-users belong to lower-income and places importance on many socio-economic needs beyond the environmental criteria. This paper discusses the arguments in proposing a sustainability framework that is tailor-made for high-rise affordable housing. In-depth interviews and observation mapping methods were used in gathering inputs from the end-users, non-governmental organisations (NGOs) as well as the professionals. ‘Bottom-up’ approach was applied in this research to show the significance of participation from the local community in the decision-making process. The proposed sustainability framework illustrates the discrepancies between user priorities and what the industry is providing. The outcome of this research suggests that integrating sustainability into high-rise affordable housing is achievable and beneficial to the industry, society, and the environment.

Keywords: green building rating tools, high-rise affordable housing, sustainability framework, sustainable development

Procedia PDF Downloads 108
19316 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 453
19315 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 46
19314 Reading High Rise Residential Development in Istanbul on the Theory of Globalization

Authors: Tuba Sari

Abstract:

One of the major transformations caused by the industrial revolution, technological developments and globalization is undoubtedly acceleration of urbanization process. Globalization, in particular, is one of the major factors that trigger this transformation. In this context, as a result of the global metropolitan city system, multifunctional rising structure forms are becoming undeniable fact of the world’s leading metropolises as the manifestation of prestige and power with different life choices, easy accessibility to services related to the era of technology. The scope of research deals with five different urban centers in İstanbul where high-rise housing is increasing dramatically after 2000’s. Therefore, the research regards multi-centered urban residential pattern being created by high-rise housing structures in the city. The methodology of the research is based on two main issue, one of them is related to sampling method of high-rise housing projects in İstanbul, while the other method of the research is based on the model of Semantics. In the framework of research hypothesis, it is aimed to prove that the character of vertical intensive structuring in Istanbul is based on seeking of different forms and images in the expressive quality, considering the production of existing high-rise buildings in residential areas in recent years. In respect to rising discourse of 'World City' in the globalizing world, it is very important to state the place of Istanbul in other developing world metropolises. In the perspective of 'World City' discourse, Istanbul has different projects concerning with globalization, international finance companies, cultural activities, mega projects, etc. In brief, the aim of this research is examining transformation forms of high-rise housing development in Istanbul within the frame of developing world cities, searching and analyzing discourse and image related to these projects.

Keywords: globalization, high-rise, housing, image

Procedia PDF Downloads 254
19313 Research Methodology of Living Environment of Modern Residential Development in St. Petersburg

Authors: Kalina Alina Aidarovna, Khayrullina Yulia Sergeevna

Abstract:

The question of forming quality housing and living environment remains a vexed problem in the current situation of high-rise apartment building in big cities of Russia. At this start up stage of the modern so-called "mass housing" market it needs to identify key quality characteristics on a different scale from apartments to the district. This paper describes the methodology of qualitative assessment of modern mass housing construction, made on the basis of the ITMO university in cooperation with the institute of spatial planning "Urbanika," based on the case study of St. Petersburg’s residential mass housing built in 2011-2014. The methodology of the study of housing and living environment goes back to the native and foreign urbanists of 60s - 80s, such Jane Jacobs, Jan Gehl, Oscar Newman, Krasheninnikov, as well as Sommer, Stools, Kohnen and Sherrod, Krasilnikova, Sychev, Zhdanov, Tinyaeva considering spatial features of living environment in a wide range of its characteristics (environmental control, territorial and personalization, privacy, etc.). Assessment is carrying out on the proposed system of criteria developed for each residential environment scale-district, quarter, courtyard, building surrounding grounds, houses, and flats. Thus the objects of study are planning unit of residential development areas (residential area, neighborhood, quarter) residential units areas (living artist, a house), and households (apartments) consisting of residential units. As a product of identified methodology, after the results of case studies of more than 700 residential complexes in St. Petersburg, we intend the creation of affordable online resource that would allow conducting a detailed qualitative evaluation or comparative characteristics of residential complexes for all participants of the construction market-developers, designers, realtors and buyers. Thereby the main objective of the rating may be achieved to improve knowledge, requirements, and demand for quality housing and living environment among the major stakeholders of the construction market.

Keywords: methodology of living environment, qualitative assessment of mass housing, scale-district, vexed problem

Procedia PDF Downloads 435
19312 The Impact of High Labour Turnover on Sustainable Housing Delivery in South Africa

Authors: Azola Agrienette Mayeza, Madifedile Thasi

Abstract:

Due to the contractual nature of jobs and employment opportunities in the construction industry and the seeming surplus of potential employees in South Africa, there is a little interest on the part of employers to put in place policies to retain experienced workers. Ironically these are the workers that the companies have expended significant resources on, in terms of training and capabilities development. The construction industry has been experiencing high materials wastages and health and safety issues to score very low on the sustainability agenda as regards resources management and safety. This study carried out an assessment of the poor retention of experienced workers in the construction industry on the capacity to deliver sustainable housing in South Africa. It highlights the economic, safety and resources conservation and other benefits accruable from a high retention of key employees to the South African construction industry towards the delivery of sustainable housing. It presents data that strongly support the hypothesis that high turnover of skilled employees as a result of the industry belief of zero incentive to retain employees beyond the contractual period, is responsible for the high wastages of resources in the industry and the safety issues. A high turnover of experienced employees in the construction industry was found to impact on the industry performance in terms of timely, cost effective and quality delivery of construction projects, particularly when measured against the government sustainable housing agenda. It also results in unplanned expenses required to train replacing employees during project executions as well as company goodwill which ultimately has a huge impact on sustainable housing delivery in South Africa.

Keywords: labour turnover, construction industry, sustainable housing, materials wastage, housing delivery, South Africa

Procedia PDF Downloads 338
19311 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 451
19310 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 68
19309 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 202
19308 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 346
19307 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 82
19306 Large Panel Technology Apartments of Yesterday and Today: Quality Aspects

Authors: Barbara Gronostajska

Abstract:

Currently, housing conditions of buildings executed in large panel technology are deteriorating. The article presents modernization solutions implemented throughout the variety of architectural activities (adding of balconies and staircases, connecting apartments) which guarantee very intriguing results that meet the needs and expectations of the modern society.

Keywords: housing estate, apartments, flats, modernization, plate blocks

Procedia PDF Downloads 453
19305 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 513
19304 Impact of the Energy Transition on Security of Supply - A Case Study of Vietnam Power System in 2030

Authors: Phuong Nguyen, Trung Tran

Abstract:

Along with the global ongoing energy transition, Vietnam has indicated a strong commitment in the last COP events on the zero-carbon emission target. However, it is a real challenge for the nation to replace fossil-fired power plants by a significant amount of renewable energy sources (RES) while maintaining security of supply. The unpredictability and variability of RES would cause technical issues for supply-demand balancing, network congestions, system balancing, among others. It is crucial to take these into account while planning the future grid infrastructure. This study will address both generation and transmission adequacy and reveal a comprehensive analysis about the impact of ongoing energy transition on the development of Vietnam power system in 2030. This will provide insight for creating an secure, stable, and affordable pathway for the country in upcoming years.

Keywords: generation adequacy, transmission adequacy, security of supply, energy transition

Procedia PDF Downloads 53
19303 Design Criteria Recommendation to Achieve Accessibility In-House to Different Users

Authors: Claudia Valderrama-Ulloa, Cristian Schmitt, Juan Pablo Marchetti, Viviana Bucarey

Abstract:

Access to adequate housing is a fundamental human right and a crucial factor for health. Housing should be inclusive, accessible, and able to meet the needs of all its inhabitants at every stage of their lives without hindering their health, autonomy, or independence. This article addresses the importance of designing housing for people with disabilities, which varies depending on individual abilities, preferences, and cultural considerations. Based on the components of the International Classification of Functioning, Disability and Health, wheelchair users, little people (achondroplasia), children with autism spectrum disorder and Down syndrome were characterized, and six domains of activities related to daily life inside homes were defined. The article describes the main barriers homes present for this group of people. It proposes a list of architectural and design aspects to reduce barriers to housing use. The aspects are divided into three main groups: space management, building services, and supporting facilities. The article emphasizes the importance of consulting professionals and users with experience designing for diverse needs to create inclusive, safe, and supportive housing for people with disabilities.

Keywords: achondroplasia, autism spectrum disorder, disability, down syndrome, wheelchair user

Procedia PDF Downloads 81
19302 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 32
19301 Sustainable Building Technologies for Post-Disaster Temporary Housing: Integrated Sustainability Assessment and Life Cycle Assessment

Authors: S. M. Amin Hosseini, Oriol Pons, Albert de la Fuente

Abstract:

After natural disasters, displaced people (DP) require important numbers of housing units, which have to be erected quickly due to emergency pressures. These tight timeframes can cause the multiplication of the environmental construction impacts. These negative impacts worsen the already high energy consumption and pollution caused by the building sector. Indeed, post-disaster housing, which is often carried out without pre-planning, usually causes high negative environmental impacts, besides other economic and social impacts. Therefore, it is necessary to establish a suitable strategy to deal with this problem which also takes into account the instability of its causes, like changing ratio between rural and urban population. To this end, this study aims to present a model that assists decision-makers to choose the most suitable building technology for post-disaster housing units. This model focuses on the alternatives sustainability and fulfillment of the stakeholders’ satisfactions. Four building technologies have been analyzed to determine the most sustainability technology and to validate the presented model. In 2003, Bam earthquake DP had their temporary housing units (THUs) built using these four technologies: autoclaved aerated concrete blocks (AAC), concrete masonry unit (CMU), pressed reeds panel (PR), and 3D sandwich panel (3D). The results of this analysis confirm that PR and CMU obtain the highest sustainability indexes. However, the second life scenario of THUs could have considerable impacts on the results.

Keywords: sustainability, post-disaster temporary housing, integrated value model for sustainability assessment, life cycle assessment

Procedia PDF Downloads 225
19300 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 127
19299 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 499
19298 Estimating Housing Prices Using Automatic Linear Modeling in the Metropolis of Mashhad, Iran

Authors: Mohammad Rahim Rahnama

Abstract:

Market-transaction price for housing is the main criteria for determining municipality taxes and is determined and announced on an annual basis. Of course, there is a discrepancy between the actual value of transactions in the Bureau of Finance (P for short) or municipality (P´ for short) and the real price on the market (P˝). The present research aims to determine the real price of housing in the metropolis of Mashhad and to pinpoint the price gap with those of the aforementioned apparatuses and identify the factors affecting it. In order to reach this practical objective, Automatic Linear Modeling, which calls for an explanatory research, was utilized. The population of the research consisted of all the residential units in Mashhad, from which 317 residential units were randomly selected. Through cluster sampling, out of the 170 income blocks defined by the municipality, three blocks form high-income (Kosar), middle-income (Elahieh), and low-income (Seyyedi) strata were surveyed using questionnaires during February and March of 2015 and the information regarding the price and specifications of residential units were gathered. In order to estimate the effect of various factors on the price, the relationship between independent variables (8 variables) and the dependent variable of the housing price was calculated using Automatic Linear Modeling in SPSS. The results revealed that the average for housing price index is 788$ per square meter, compared to the Bureau of Finance’s prices which is 10$ and that of municipality’s which is 378$. Correlation coefficient among dependent and independent variables was calculated to be R²=0.81. Out of the eight initial variables, three were omitted. The most influential factor affecting the housing prices is the quality of Quality of construction (Ordinary, Full, Luxury). The least important factor influencing the housing prices is the variable of number of sides. The price gap between low-income (Seyyedi) and middle-income (Elahieh) districts was not confirmed via One-Way ANOVA but their gap with the high-income district (Kosar) was confirmed. It is suggested that city be divided into two low-income and high-income sections, as opposed three, in terms of housing prices.

Keywords: automatic linear modeling, housing prices, Mashhad, Iran

Procedia PDF Downloads 232
19297 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 170
19296 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 323
19295 Evaluation of Housing Quality in the Urban Fringes of Ibadan, Nigeria

Authors: Amao Funmilayo Lanrewaju

Abstract:

The study examined the socio-economic characteristics of the residents in selected urban fringes of Ibadan; identified and examined the housing and neighbourhood characteristics and evaluated housing quality in the study area. It analysed the relationship between the socio-economic characteristics of the residents, housing and neighbourhood characteristics as well as housing quality in the study area. This was with a view to providing information that would enhance the housing quality in urban fringes of Ibadan. Primary and secondary data were used for the study. A survey of eleven purposively selected communities from Oluyole and Egbeda local government areas in the urban fringes was conducted through a questionnaire administration and expert rating by five independent assessors (Qualified Architects) using penalty scoring within similar time-frames. The study employed a random sampling method to select a sample size of 480 houses representing 5% of the sampling frame of 9600 houses. Respondent in the first house was selected randomly and subsequently every 20th house in the streets involved was systematically selected for questionnaire administration, usually a household-head per building. The structured questionnaire elicited information on socio-economic characteristics of the residents, housing and neighbourhood characteristics, factors affecting housing quality and housing quality in the study area. Secondary data obtained for the study included the land-use plan of Ibadan from previous publications, housing demographics, population figures from relevant institutions and other published materials. The data collected were analysed using descriptive and inferential statistics such as frequency distribution, Cross tabulation, Correlation Analysis, Analysis of Variance (ANOVA) and Relative Importance Index (RII). The result of the survey revealed that respondents from the Yoruba ethnic group constituted the majority, comprising 439 (91.5%) of the 480 respondents from the two local government areas selected. It also revealed that the type of tenure status of majority of the respondents in the two local government areas was self-ownership (234, 48.8%), while 44.0% of the respondents acquired their houses through personal savings. Cross tabulation indicated that majority (67.1%, 322 out of 480) of the respondents were low-income earners. The study showed that both housing and neighbourhood services were not adequately provided across neighbourhoods in the study area. Correlation analysis indicated a significant relationship between respondents’ socio–economic status and their general housing quality (r=0.46; p-value of 0.01< 0.05). The ANOVA indicated that the relationship between socio-economic characteristics of the residents, housing and neighbourhood characteristics in the study area was significant (F=18.289, p=0.00; the coefficient of determination R2= 0.192). The findings from the study however revealed that there was no significant difference in the results obtained from users based evaluation and expert rating. The study concluded that housing quality in the urban fringes of Ibadan is generally poor and the socio-economic status of the residents significantly influenced the housing quality.

Keywords: housing quality, urban fringes, economic status, poverty

Procedia PDF Downloads 412
19294 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 163
19293 Power Line Communication Integrated in a Wireless Power Transfer System: Feasibility of Surveillance Movement

Authors: M. Hemnath, S. Kannan, R. Kiran, K. Thanigaivelu

Abstract:

This paper is based on exploring the possible opportunities and applications using Power Line Communication (PLC) for security and surveillance operations. Various research works are done for introducing PLC into onboard vehicle communication and networking (CAN, LIN etc.) and various international standards have been developed. Wireless power transfer (WPT) is also an emerging technology which is studied and tested for recharging purposes. In this work we present a system which embeds the detection and the response into one which eliminates the need for dedicated network for data transmission. Also we check the feasibility for integrating wireless power transfer system into this proposed security system for transmission of power to detection unit wirelessly from the response unit.

Keywords: power line communication, wireless power transfer, surveillance

Procedia PDF Downloads 497
19292 An Assessment of Redevelopment of Cessed Properties in the Island City of Mumbai, India

Authors: Palak Patel

Abstract:

Mumbai is one of the largest cities of the country with a population of 12.44 million over 437 Sq.km, and it is known as financial hub of India. In early 20th century, with the expansion of industrialization and growth of port, a huge demand for housing was created. In response to this, government enacted rent controls. Over a period of time, due to rent controls, the existing rental housing stock has deteriorated. Therefore, in last 25 years, government has been focusing on redevelopment of these rental buildings, also called ‘Cessed buildings’, in order to provide better standard of living to the tenants and also, to supply new housing units in the market. In India, developers are the main players in the housing market as they are the supplier of maximum dwelling units in the market. Hence, government attempts are inclined toward facilitating developers for the cessed building redevelopment projects by incentivizing them through making special provisions in the development control regulations. This research focuses on the entire process of redevelopment by the developers and issues faced by the related stakeholders in the same to reduce the stress on housing. It also highlights the loopholes in the current system and inefficient functioning of the process. The research was carried out by interviewing various developers, tenants and landlords in the island city who have already gone through redevelopment. From the case studies, it is very evident that redevelopment is undoubtedly a huge profit making business. In some cases, developers make profit of almost double the amount of the investment. But yet, satisfactory results are not seen on ground. It clearly indicates that there are some issues faced by developers which have not been addressed. Some of these issues include cumbersome legal procedures, negotiations with landlords and tenants, congestion and narrow roads, small size of the plots, informal practicing of ‘Pagdi system’ and financial viability of the project. This research recommends the up gradation of the existing cessed buildings by sharing the repairing and maintenance cost between landlords and tenants and also, income levels of tenants can be traced and housing vouchers or incentives can be provided to those who actual need it so that landlord does not have to subsidize the tenants. For redevelopment, the current interventions are generalized in nature as it does not take on ground issues into the consideration. There is need to identify local issues and give area specific solutions. And also, government should play a role of mediator to ensure all the stakeholders are satisfied and project gets completed on time.

Keywords: cessed buildings, developers, government’s interventions, redevelopment, rent controls, tenants

Procedia PDF Downloads 158
19291 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 454
19290 Socio-Economic Child’S Wellbeing Impasse in South Africa: Towards a Theory-Based Solution Model

Authors: Paulin Mbecke

Abstract:

Research Issue: Under economic constraints, socio-economic conditions of households worsen discounting child’s wellbeing to the bottom of many governments and households’ priority lists. In such situation, many governments fail to rebalance priorities in providing services such as education, housing and social security which are the prerequisites for the wellbeing of children. Consequently, many households struggle to respond to basic needs especially those of children. Although economic conditions play a crucial role in creating prosperity or poverty in households and therefore the wellbeing or misery for children; they are not the sole cause. Research Insights: The review of the South African Index of Multiple Deprivation and the South African Child Gauge establish the extent to which economic conditions impact on the wellbeing or misery of children. The analysis of social, cultural, environmental and structural theories demonstrates that non-economic factors contribute equally to the wellbeing or misery of children, yet, they are disregarded. In addition, the assessment of a child abuse database proves a weak correlation between economic factors (prosperity or poverty) and child’s wellbeing or misery. Theoretical Implications: Through critical social research theory and modelling, the paper proposes a Theory-Based Model that combines different factors to facilitate the understanding of child’s wellbeing or misery. Policy Implications: The proposed model assists in broad policy and decision making and reviews processes in promoting child’s wellbeing and in preventing, intervening and managing child’s misery with regard to education, housing, and social security.

Keywords: children, child’s misery, child’s wellbeing, household’s despair, household’s prosperity

Procedia PDF Downloads 256
19289 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547