Abstract: The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.
Abstract: Virtualization technologies are experiencing a renewed interest as a way to improve system reliability, and availability, reduce costs, and provide flexibility. This paper presents the development on leverage existing cloud infrastructure and virtualization tools. We adopted some virtualization technologies which improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed. Given the development of application virtualization, it allows shifting the user’s applications from the traditional PC environment to the virtualized environment, which is stored on a remote virtual machine rather than locally. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. Users no longer need to burden the platform maintenances and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible and web-based application virtualization service represents the next significant step to the mobile workplace, and it lets user executes their applications from virtually anywhere.
Abstract: In April 2015, a magnitude 7.8 earthquake struck Nepal, killing, injuring, and displacing thousands of people. The earthquake also damaged water and sanitation service networks, leading to a high risk of diarrheal disease and the associated negative health impacts. In response to the disaster, the Environment and Public Health Organization (ENPHO), a Kathmandu-based non-governmental organization, worked with the Centre for Affordable Water and Sanitation Technology (CAWST), a Canadian education, training and consulting organization, to develop two training programs to educate volunteers on water, sanitation, and hygiene (WASH) needs. The first training program was intended for acute response, with the second focusing on longer term recovery. A key focus was to equip the volunteers with the knowledge and skills to formulate useful WASH advice in the unanticipated circumstances they would encounter when working in affected areas. Within the first two weeks of the disaster, a two-day acute response training was developed, which focused on enabling volunteers to educate those affected by the disaster about local WASH issues, their link to health, and their increased importance immediately following emergency situations. Between March and October 2015, a total of 19 training events took place, with over 470 volunteers trained. The trained volunteers distributed hygiene kits and liquid chlorine for household water treatment. They also facilitated health messaging and WASH awareness activities in affected communities. A three-day recovery phase training was also developed and has been delivered to volunteers in Nepal since October 2015. This training focused on WASH issues during the recovery and reconstruction phases. The interventions and recommendations in the recovery phase training focus on long-term WASH solutions, and so form a link between emergency relief strategies and long-term development goals. ENPHO has trained 226 volunteers during the recovery phase, with training ongoing as of April 2016. In the aftermath of the earthquake, ENPHO found that its existing pool of volunteers were more than willing to help those in their communities who were more in need. By training these and new volunteers, ENPHO was able to reach many more communities in the immediate aftermath of the disaster; together they reached 11 of the 14 earthquake-affected districts. The collaboration between ENPHO and CAWST in developing the training materials was a highly collaborative and iterative process, which enabled the training materials to be developed within a short response time. By training volunteers on basic WASH topics during both the immediate response and the recovery phase, ENPHO and CAWST have been able to link immediate emergency relief to long-term developmental goals. While the recovery phase training continues in Nepal, CAWST is planning to decontextualize the training used in both phases so that it can be applied to other emergency situations in the future. The training materials will become part of the open content materials available on CAWST’s WASH Resources website.
Abstract: Climate change remains a challenging matter for the human and the built environment in the 21st century, where the need to consider adaptation to climate change in the development process is paramount. However, there remains a lack of information regarding how we should prepare responses to this issue, such as through developing organized and sophisticated tools enabling the adaptation process. This study aims to build a systematic framework approach to investigate the potentials that Neighborhood Sustainability Assessment tools (NSA) might offer in enabling both the analysis of the emerging adaptive capacity to climate change. The analysis of the framework presented in this paper aims to discuss this issue in three main phases. The first part attempts to link sustainability and climate change, in the context of adaptive capacity. It is argued that in deciding to promote sustainability in the context of climate change, both the resilience and vulnerability processes become central. However, there is still a gap in the current literature regarding how the sustainable development process can respond to climate change. As well as how the resilience of practical strategies might be evaluated. It is suggested that the integration of the sustainability assessment processes with both the resilience thinking process, and vulnerability might provide important components for addressing the adaptive capacity to climate change. A critical review of existing literature is presented illustrating the current lack of work in this field, integrating these three concepts in the context of addressing the adaptive capacity to climate change. The second part aims to identify the most appropriate scale at which to address the built environment for the climate change adaptation. It is suggested that the neighborhood scale can be considered as more suitable than either the building or urban scales. It then presents the example of NSAs, and discusses the need to explore their potential role in promoting the adaptive capacity to climate change. The third part of the framework presents a comparison among three example NSAs, BREEAM Communities, LEED-ND, and CASBEE-UD. These three tools have been selected as the most developed and comprehensive assessment tools that are currently available for the neighborhood scale. This study concludes that NSAs are likely to present the basis for an organized framework to address the practical process for analyzing and yet promoting Adaptive Capacity to Climate Change. It is further argued that vulnerability (exposure & sensitivity) and resilience (Interdependence & Recovery) form essential aspects to be addressed in the future assessment of NSA’s capability to adapt to both short and long term climate change impacts. Finally, it is acknowledged that further work is now required to understand impact assessment in terms of the range of physical sectors (Water, Energy, Transportation, Building, Land Use and Ecosystems), Actor and stakeholder engagement as well as a detailed evaluation of the NSA indicators, together with a barriers diagnosis process.
Abstract: Purpose: The key aim of the research was to identify
the secondary stressors experienced by businesses affected by single
or repeated flooding and to determine to what extent businesses were
affected by these stressors, along with any resulting impact on health.
Additionally the research aimed to establish the likelihood of
businesses being re-exposed to the secondary stressors through
assessing awareness of flood risk, implementation of property
protection measures and level of community resilience. Design/methodology/approach: The chosen research method
involved the distribution of a questionnaire survey to businesses
affected by either single or repeated flood events. The questionnaire
included the Impact of Event Scale (a 15-item self-report measure
which assesses subjective distress caused by traumatic events). Findings: 55 completed questionnaires were returned by flood
impacted businesses. 89% of the businesses had sustained internal
flooding, while 11% had experienced external flooding. The results
established that the key secondary stressors experienced by
businesses, in order of priority, were: flood damage, fear of
reoccurring flooding, prevention of access to the premise/closure,
loss of income, repair works, length of closure and insurance issues.
There was a lack of preparedness for potential future floods and
consequent vulnerability to the emergence of secondary stressors
among flood affected businesses, as flood resistance or flood
resilience measures had only been implemented by 11% and 13%
respectively. In relation to the psychological repercussions, the
Impact of Event scores suggested that potential prevalence of posttraumatic
stress disorder (PTSD) was noted among 8 out of 55
respondents (l5%). Originality/value: The results improve understanding of the
enduring repercussions of flood events on businesses, indicating that
not only residents may be susceptible to the detrimental health
impacts of flood events and single flood events may be just as likely
as reoccurring flooding to contribute to ongoing stress. Lack of
financial resources is a possible explanation for the lack of
implementation of property protection measures among businesses,
despite 49% experiencing flooding on multiple occasions. Therefore
it is recommended that policymakers should consider potential
sources of financial support or grants towards flood defences for
flood impacted businesses. Any form of assistance should be made
available to businesses at the earliest opportunity as there was no
significant association between the time of the last flood event and
the likelihood of experiencing PTSD symptoms.
Abstract: The article deals with the readiness of military
professionals for challenging situations. It discusses higher
requirements on the psychical endurance of military professionals
arising from the specific nature of the military occupation, which is
typical for being very difficult to maintain regularity, which is in
accordance with the hygiene of work alternated by relaxation. The
soldier must be able to serve in the long term and constantly intense
performance that goes beyond human tolerance to stress situations. A
challenging situation is always associated with overcoming
difficulties, obstacles and complicated circumstances or using
unusual methods, ways and means to achieve the desired (expected)
objectives, performing a given task or satisfying an important need.
This paper describes the categories of challenging situations, their
classification and characteristics. Attention is also paid to the
formation of personality in challenging situations, coping with stress
in challenging situations, Phases of solutions of stressful situations,
resistance to challenging life situations and its factors. Finally, the
article is focused on increasing the readiness of military professionals
for challenging situations.
Abstract: Cyber exercises used to assess the preparedness of a
community against cyber crises, technology failures and Critical
Information Infrastructure (CII) incidents. The cyber exercises also
called cyber crisis exercise or cyber drill, involved partnerships or
collaboration of public and private agencies from several sectors.
This study investigates Organisation Cyber Resilience (OCR) of
participation sectors in cyber exercise called X Maya in Malaysia.
This study used a principal based cyber resilience survey called CSuite
Executive checklist developed by World Economic Forum in
2012. To ensure suitability of the survey to investigate the OCR, the
reliability test was conducted on C-Suite Executive checklist items.
The research further investigates the differences of OCR in ten
Critical National Infrastructure Information (CNII) sectors
participated in the cyber exercise. The One Way ANOVA test result
showed a statistically significant difference of OCR among ten CNII
sectors participated in the cyber exercise.
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: Cloud computing is the innovative and leading
information technology model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal
management effort. In this paper, we aim at the development of
workflow management system for cloud computing platforms based
on our previous research on the dynamic allocation of the cloud
computing resources and its workflow process. We took advantage of
the HTML5 technology and developed web-based workflow interface.
In order to enable the combination of many tasks running on the cloud
platform in sequence, we designed a mechanism and developed an
execution engine for workflow management on clouds. We also
established a prediction model which was integrated with job queuing
system to estimate the waiting time and cost of the individual tasks on
different computing nodes, therefore helping users achieve maximum
performance at lowest payment. This proposed effort has the potential
to positively provide an efficient, resilience and elastic environment
for cloud computing platform. This development also helps boost user
productivity by promoting a flexible workflow interface that lets users
design and control their tasks' flow from anywhere.
Abstract: The authors propose the identification, analysis and
prognosis of the quantitative and qualitative evolution of the elderly
population in the functional urban areas. The present paper takes into
account the analysis of some representative indicators (the weight of
the elderly population, ageing index, dynamic index of economic
ageing of productive population etc.) and the elaboration of an
integrated indicator that would help differentiate the population
ageing forms in the 48 functional urban areas that were defined based
on demographic and social-economic criteria for all large and
medium cities in Romania.
Abstract: The purpose of this study is to investigate the kinematic
characteristics and differences of the snatch barbell trajectory of 53 kg
class female weight lifters. We take the 2014 Taiwan College Cup
players as examples, and tend to make kinematic applications through
the proven weightlifting barbell track system. The competition videos
are taken by consumer camcorder with a tripod which set up at the side
of the lifter. The results will be discussed in three parts, the first part is
various lifting phase, the second part is the compare lifting between
success and unsuccessful, and the third part is to compare the
outstanding player with the general. Conclusion through the barbell
can be used to observe the trajectories of our players lifting the usual
process cannot be observed in the presence of malfunction or habits, so
that the coach can find the problem and guide the players more
accurately. Our system can be applied in practice and competition to
increase the resilience of the lifter on the field.
Abstract: This experimental study evaluates the effect of using
Cognitive-Behavioral Therapy (CBT) and Multidimensional Self-
Concept Model (MSCM) in a drug prevention programme to increase
resiliency and reduce aggression among at-risk youth in Malaysia. A
number of 60 (N=60) university students who were at-risk of taking
drugs were involved in this study. Participants were identified with
self-rating scales, Adolescent Resilience Attitude Scale (ARAS) and
Aggression Questionnaire. Based on the mean score of these
instruments, the participants were divided into the treatment group,
and the control group. Data were analyzed using t-test. The finding
showed that the mean score of resiliency was increased in the
treatment group compared to the control group. It also shows that the
mean score of aggression was reduced in the treatment group
compared to the control group. Drug Prevention Programme was
found to help in enhancing resiliency and reducing aggression among
participants in the treatment group compared to the controlled group.
Implications were given regarding the preventive actions on drug
abuse among youth in Malaysia.
Abstract: Risk analysis is considered as a fundamental aspect
relevant for ensuring the level of critical infrastructure protection,
where the critical infrastructure is seen as system, asset or its part
which is important for maintaining the vital societal functions. Article
actually discusses and analyzes the potential application of selected
tools of information support for the implementation and within the
framework of risk analysis and critical infrastructure protection. Use
of the information in relation to their risk analysis can be viewed as a
form of simplifying the analytical process. It is clear that these
instruments (information support) for these purposes are countless, so
they were selected representatives who have already been applied in
the selected area of critical infrastructure, or they can be used. All
presented fact were the basis for critical infrastructure resilience
evaluation methodology development.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Climate change confronts the built environment with
many new challenges in the form of more severe and frequent hydrometeorological
events. A series of strategies is proposed whereby the
various aspects of buildings and their sites can be made more resilient
to the effects of such events.
Abstract: In the UK, flooding is responsible for significant
losses to the economy due to the impact on businesses, the vast
majority of which are Small and Medium Enterprises (SMEs).
Businesses of this nature tend to lack formal plans to aid their
response to and recovery from disruptive events such as flooding.
This paper reports on work on how an agent-based model (ABM) is
being developed based on interview data gathered from SMEs at-risk
of flooding and/or have direct experience of flooding. The ABM will
enable simulations to be performed allowing investigations of
different response strategies which SMEs may employ to lessen the
impact of flooding, thus strengthening their resilience.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.
Abstract: Urban greenery remains the bastion of urban
landscape and a key to sustainable development due to its integral
connections to the general health and wellbeing of urban residents.
However, in an era of rapid urbanisation, recent studies indicate that
urban greenery, especially ecologically sensitive areas, in many
African cities is becoming increasingly depleted. Given the scale and
rate of natural and anthropogenic change, effective management of
urban greenery as the ultimate goal of restoring depleting urban
landscapes is urgent. This review advocates for an urban resilience
model to managing urban greenery.
Abstract: Cloud virtualization technologies are becoming more
and more prevalent, cloud users usually encounter the problem of how
to access to the virtualized remote desktops easily over the web
without requiring the installation of special clients. To resolve this
issue, we took advantage of the HTML5 technology and developed
web-based remote desktop. It permits users to access the terminal
which running in our cloud platform from anywhere. We implemented
a sketch of web interface following the cloud computing concept that
seeks to enable collaboration and communication among users for
high performance computing. Given the development of remote
desktop virtualization, it allows to shift the user’s desktop from the
traditional PC environment to the cloud platform, which is stored on a
remote virtual machine rather than locally. This proposed effort has
the potential to positively provide an efficient, resilience and elastic
environment for online cloud service. This is also made possible by the
low administrative costs as well as relatively inexpensive end-user
terminals and reduced energy expenses.