Search results for: security and protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4796

Search results for: security and protection

1766 Application of Watershed Modeling System for Urbanization Management in Tabuk Area, Saudi Arabia

Authors: Abd-Alrahman Embaby, Ayman Abu Halawa, Medhat Ramadan

Abstract:

The infiltrated water into the subsurface activates expansive soil in localized manner, leading to the differential heaving and destructive of the construction. The Watershed Modeling System (WMS) and Hydrologic Engineering Center (HEC-1) are used to delineate and identify the drainage system and basin morphometry in Tabuk area, where flash floods and accumulation of water may take place. Eight drainage basins effect on Tabuk city. Three of them are expected to be high. The flash floods and surface runoff behavior in these basins are important for any protection projects. It was found that the risky areas that contain Tabuk shale could be expanded when exposed to flash floods and/or surface runoff. The resident neighborhoods in the middle of Tabuk city and affected by surface runoff of the tributaries of the basin of Wadi Abu Nishayfah, Na'am and Atanah outlet, represent high-risk zones. These high-risk neighborhoods are Al Qadsiyah, Al Maseif, Arrwdah, Al Nakhil and Al Rajhi. It can be avoided new constructions on these districts. The low or very low-risk zones include the western and the eastern districts. The western side of the city is lying in the upstream of the small basin. It is suitable for a future urban extension. The direction of surface runoff flow or storm water drain discharge should be away from Tabuk city. The quicker the water can flow out, the better it is.

Keywords: digital elevation model (DEM), flash floods, Saudi Arabia, Tabuk City, watershed modeling system (WMS)

Procedia PDF Downloads 256
1765 Functional Yoghurt Enriched with Microencapsulated Olive Leaves Extract Powder Using Polycaprolactone via Double Emulsion/Solvent Evaporation Technique

Authors: Tamer El-Messery, Teresa Sanchez-Moya, Ruben Lopez-Nicolas, Gaspar Ros, Esmat Aly

Abstract:

Olive leaves (OLs), the main by-product of the olive oil industry, have a considerable amount of phenolic compounds. The exploitation of these compounds represents the current trend in food processing. In this study, OLs polyphenols were microencapsulated with polycaprolactone (PCL) and utilized in formulating novel functional yoghurt. PCL-microcapsules were characterized by scanning electron microscopy, and Fourier transform infrared spectrometry analysis. Their total phenolic (TPC), total flavonoid (TFC) contents, and antioxidant activities (DPPH, FRAP, ABTS), and polyphenols bioaccessibility were measured after oral, gastric, and intestinal steps of in vitro digestion. The four yoghurt formulations (containing 0, 25, 50, and 75 mg of PCL-microsphere/100g yoghurt) were evaluated for their pH, acidity, syneresis viscosity, and color during storage. In vitro digestion significantly affected the phenolic composition in non-encapsulated extract while had a lower impact on encapsulated phenolics. Higher protection was provided for encapsulated OLs extract, and their higher release was observed at the intestinal phase. Yoghurt with PCL-microsphere had lower viscosity, syneresis, and color parameters, as compared to control yoghurt. Thus, OLs represent a valuable and cheap source of polyphenols which can be successfully applied, in microencapsulated form, to formulate functional yoghurt.

Keywords: yoghurt quality attributes, olive leaves, phenolic and flavonoids compounds, antioxidant activity, polycaprolactone as microencapsulant

Procedia PDF Downloads 137
1764 Short and Long Term Effects of an Attachment-Based Intervention on Child Behaviors

Authors: Claire Baudry, Jessica Pearson, Laura-Emilie Savage, George Tarbulsy

Abstract:

Over the last fifty years, maternal sensitivity and child development among vulnerable families have been a priority for researchers. For this reason, attachment-based interventions have been implemented and been shown to be effective in enhancing child development. Most of the time, child outcomes are measured shortly after the intervention. Objectives: The goal of the study was to investigate the effects of an attachment-based intervention on child development shortly after the intervention ended and one-year post-intervention. Methods: Over the seventy-two mother-child dyads referred by Child Protective Services in the province of Québec, Canada, forty-two were included in this study: 24 dyads who received 6 to 8 intervention sessions and 18 dyads who did not. Intervention and none intervention dyads were matched for the following variables: duration of child protective services, the reason for involvement with child protection, age, sex, and family status. Internalizing and externalizing behaviors were measured 3 and 12 months after the end of the intervention when the average age of children were respectively 45 and 54 months old. Findings: Independent-sample t-tests were conducted to compare scores between the two groups and the two data collection times. In general, on differences observed between the two groups three months after the intervention ended, just a few of them were still present nine months later. Conclusions: This first set of analyses suggests that the effects of attachment-based intervention observed three months following the intervention are not lasting for most of them. Those results inform us of the importance of considering the possibility to offer more attachment-based intervention sessions for those highly vulnerable families.

Keywords: attachment-based intervention, child behaviors, child protective services, highly vulnerable families

Procedia PDF Downloads 130
1763 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 55
1762 Study of Pseudomonas as Biofertiliser in Salt-Affected Soils of the Northwestern Algeria: Solubilisation of Calcium Phosphate and Growth Promoting of Broad Bean (Vcia faba)

Authors: A. Djoudi, R. Djibaou, H. A. Reguieg Yssaad

Abstract:

Our study focuses on the study of a bacteria belonging to Pseudomonas solubilizing tricalcium phosphate. They were isolated from rhizosphere of a variety of broad bean grown in salt-affected soils (electrical conductivity between 4 and 8 mmhos/cm) of the irrigated perimeter of Mina in northwestern Algeria. Isolates which have advantageous results in the calcium phosphate solubilization index test were subjected to identification using API20 then used to re-inoculate the same soil in pots experimentation to assess the effects of inoculation on the growth of the broad bean (Vicia faba). Based on the results obtained from the in-vitro tests, two isolates P5 and P8 showed a significant effect on the solubilization of tricalcium phosphate with an index I estimated at 314% and 283% sequentially. According to the results of in-vivo tests, the inoculation of the soil with P5 and P8 were significantly and positively influencing the growth in biometric parameters of the broad bean. Inoculation with strain P5 has promoted the growth of the broad bean in stem height, stem fresh weight and stem dry weight of 108.59%, 115.28%, 104.33%, respectively. Inoculation with strain P8 has fostered the growth of the broad bean stem fresh weight of 112.47%. The effect of Pseudomonas on the development of Vicia faba is considered as an interesting process by which PGPR can increase biological production and crop protection.

Keywords: Pseudomonas, Vicia faba, promoting of plant growth, solubilization tricalcium phosphate

Procedia PDF Downloads 325
1761 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt

Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri

Abstract:

Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.

Keywords: Alexandria, density, mixed use, transportation, vibrancy

Procedia PDF Downloads 286
1760 Iran and the Security of the Gulf Cooperation Council States

Authors: Ibrahim Alshalan

Abstract:

The Islamic Republic of Iran is one of the greatest and most powerful countries, not only in the Arabian Gulf but in the entire Middle East region. However, the Iranian regime, which came to power as a result of the 1979 revolution that resulted in overthrowing the Shah Mohammad Reza Pahlavi, has been the biggest source of threat to the stability of the Middle East since the revolution until this day. It has ambitions to dominate the neighboring Arab countries, especially Iraq, Syria, Lebanon, Yemen and Bahrain. Iran has bad relationships with countries of the Gulf Cooperation Council (GCC), which includes Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman and Bahrain. The main objective of this paper is to shed light on the deteriorating political relations between the Iranian regime on one hand and the GCC on the other, especially Saudi Arabia which is witnessing more challenges as a result of Iran's determination to develop its nuclear program. Another important objective of this paper is to identify the Iranian role in the creation of the hotbeds of conflict in addition to its responsibility for some of the region's problems. It also aims to answer the question; why does Iran insist on developing its controversial nuclear program?

Keywords: Iran, GCC, Gulf, Saudi Arabia

Procedia PDF Downloads 567
1759 Radioprotective Effects of Selenium and Vitamin-E against 6Mv X-Rays in Human Volunteers Blood Lymphocytes by Micronuclei Assay

Authors: Vahid Changizi, Aram Rostami, Akbar Mosavi

Abstract:

Purpose of study: Critical macromolecules of cells such as DNA are in exposure to damage of free radicals that induced from interaction of ionizing radiation with biological systems. Selenium and vitamin-E are natural compound that has been shown to be a direct free radical scavenger. The aim of this study was to investigate the in vivo/in vitro radioprotective effect of selenium and vitamin-E separately and synergistically against genotoxicity induced by 6MV x-rays irradiation in cultured blood lymphocytes from 15 human volunteers. Methods: Fifteen volunteers were divided in three groups include A, B and C. These groups were given slenium(800 IU), vitamin-E(100 mg) and selenium(400 IU) + vitamin-E(50 mg), respectively. Peripheral blood samples were collected from each group before(0 hr) and 1, 2 and 3 hr after selenium and vitamin-E administration (separately and synergistically). Then the blood samples were irradiated to 200 cGy of 6 Mv x-rays. After that, lymphocyte samples were cultured with mitogenic stimulation to determine the chromosomal aberrations wih micronucleus assay in cytokinesis-blocked binucleated cells. Results: The lymphocytes in the blood samples collected at 1 hr after ingestion selenium and vitamin-E, exposed in vitro to x-rays exhibited a significant decrease in the incidence of micronuclei, compared with control group at 0 hr. The maximum protection and decrease in frequency of micronuclei(50%) was observed at 1 hr after administration of selenium and vitamin-E synergistically. Conclusion: The data suggest that ingestion of selenium and vitamin-E as a radioprotector substances before exposures may reduce genetic damage caused by x-rays irradiation.

Keywords: x-rays, selenium, vitamin-e, lymphocyte, micronuclei

Procedia PDF Downloads 266
1758 Factors Associated with Injuries and Trauma Among the Survivors of Gender-Based Violence in Afghanistan

Authors: Mohammad Akbar Paiman, Yasmin Nadeem Parpio, Naureen Akbarali, Khwaja Mir Islam Saeed, Murad Moosa Khan

Abstract:

Background: Gender-based violence (GBV) is widely considered a significant public health problem that is associated with acute morbidity and mortality. GBV is commonly understood as a physical, sexual, and mental assault from intimate partners, sexual violence by non-partners, sexual assault of girls, and acts like trafficking women for sex. Objective: This study aimed to determine the factors associated with injuries and trauma among victims of GBV in Afghanistan. Method: We conducted a record-based analysis of the data collected by the Gender Department of the Family Protection Centre nationally between November 2013 and October 2019. Cross-tabulation between different variables such as age, sex, marital status, and type of violence and associations between different types of violence, age, gender, and geographical location was determined using the logistic regression model. Results: During the study period, there were a total of 58,160 GBV in Afghanistan. Most of the victims were women 98% with over three-quarters being adults 78%. Most of the victims were married 76%, followed by single 14%, widowed 5%, and engaged 5%. Over three-quarters of the violence, 73% was observed in the victim’s house while nearly one-quarter of the violence 24 % occurred in the perpetrator’s house. Conclusions: GBV is a significant public health problem in Afghanistan that needs to be addressed at multiple levels including policy, state, and community as well as by raising public awareness and education and a strong code of conduct against GBV by all stakeholders.

Keywords: gender-based violence, physical and psychological violence, injuries, Afghanistan

Procedia PDF Downloads 49
1757 Evaluation of the Spatial Performance of Ancient Cities in the Context of Landscape Architecture

Authors: Elvan Ender Altay, Zeynep Pirselimoglu Batman, Murat Zencirkiran

Abstract:

Ancient cities are, according to United Nations Educational, Scientific and Cultural Organization (UNESCO), landscape areas designed and created by people, at the same time naturally developing and constantly changing sustainable cultural landscapes. Ancient cities are the urban settlements where we can see the reflection of public lifestyle existed thousands of years ago. The conceptual and spatial traces in ancient cities, are crucial for examining the city history and its preservation. This study is intended to demonstrate the impacts of human life and physical environment on the cultural landscape. This research aims to protect and maintain cultural continuity of the ancient cities in Bursa which contain archeological and historical elements and could not majorly reach to the day because of not being protected and to show importance of landscape architecture to ensure this protection. In this context, ancient cities in Bursa were researched and a total of 7 ancient cities were identified. These ancient cities are; Apollonia, Lopadion, Nicaea, Myrleia, Cius, Daskyleion and Basilinopolis. In the next stage, the spatial performances of ancient cities were assessed by weighted criteria method. The highest score is the Nicaea Ancient City. Considering current situation of the ancient cities in Bursa, it is seen that most of them could not survive until our day due to lack of interest in these areas. As a result, according to the findings, it is a priority to create a protective band with green areas around the archaeological sites, thus adapting to nearby areas and emphasizing culture. In addition, proposals have been made to provide a transportation network that does not harm the ancient cities and the cultural landscape.

Keywords: ancient cities, Bursa, landscape, spatial performance

Procedia PDF Downloads 193
1756 New Employee on-Boarding Program: Effective Tool for Reducing the Prevalence of Workplace Injuries/Accidents

Authors: U. Ugochukwu, J. Lee, P. Conley

Abstract:

According to a recent survey by the UT Southwestern Workplace Safety Committee, the three most common on-the-job injuries reported by workers at the medical center are musculoskeletal injuries, slip-and-fall injuries and repetitive motion injuries. Last year alone, of the 650 documented workplace injuries and accidents, 45% were seen in employees in their first-two years of employment. UT Southwestern New Employee On-Boarding program was created and modeled to follows OSHA’s model that consist of: determining if training is needed, identifying training needs, identifying goals and objectives, developing learning activities, conducting the training, evaluating program effectiveness, and improving the program. The hospital’s management best practices were recreated to limit and control workplace injuries and accidents. Regular trainings and workshops on workplace safety and compliance were initiated for new employees. Various computer workstations were evaluated and recommendations were made to reduce musculoskeletal disorders. Post exposure protocols and workers protection programs were remodeled for infectious agents and chemicals used in the hospital, and medical surveillance programs were updated, for every emerging threat, to ensure they are in compliance with the US policy, regulatory and standard setting organizations. If ignorance of specific job hazards and of proper work practices is to blame for this higher injury rate, then training will help to provide a solution. Use of this program in training activities is just one of many ways UT Southwestern complied with the OSHA standards that relate to training while enhancing the safety and health of their employees.

Keywords: ergonomics, hazard, on-boarding, surveillance, workplace

Procedia PDF Downloads 328
1755 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 92
1754 The Reasons for Food Losses and Waste and the Trends of Their Management in Basic Vegetal Production in Poland

Authors: Krystian Szczepanski, Sylwia Łaba

Abstract:

Production of fruit and vegetables, food cereals or oilseeds affects the natural environment via intake of nutrients being contained in the soil, use of the resources of water, fertilizers and food protection products, and energy. The limitation of the mentioned effects requires the introduction of techniques and methods for cultivation being friendly to the environment and counteracting losses and waste of agricultural raw materials as well as the appropriate management of food waste in every stage of the agri-food supply chain. The link to basic production includes obtaining a vegetal raw material and its storage in agricultural farm and transport to a collecting point. When the plants are ready to be harvested is the initial point; the stage before harvesting is not considered in the system of measuring and monitoring the food losses. The moment at which the raw material enters the stage of processing, i.e., its receipt at the gate of the processing plant, is considered as a final point of basic production. According to the Regulation (EC) No 178/2002 of the European Parliament and of the Council of 28 January 2002, Art. 2, “food” means any substance or product, intended to be, or reasonably expected to be consumed by humans. For the needs of the studies and their analysis, it was determined when raw material is considered as food – the plants (fruit, vegetables, cereals, oilseeds), after being harvested, arrive at storehouses. The aim of the studies was to determine the reasons for loss generation and to analyze the directions of their management in basic vegetal production in Poland in the years 2017 and 2018. The studies on food losses and waste in basic vegetal production were carried out in three sectors – fruit and vegetables, cereals and oilseeds. The studies of the basic production were conducted during the period of March-May 2019 at the territory of the whole country on a representative trail of 250 farms in each sector. The surveys were carried out using the questionnaires by the PAP method; the pollsters conducted the direct questionnaire interviews. From the conducted studies, it is followed that in 19% of the examined farms, any losses were not recorded during preparation, loading, and transport of the raw material to the manufacturing plant. In the farms, where the losses were indicated, the main reason in production of fruit and vegetables was rotting and it constituted more than 20% of the reported reasons, while in the case of cereals and oilseeds’ production, the respondents identified damages, moisture and pests as the most frequent reason. The losses and waste, generated in vegetal production as well as in processing and trade of fruit and vegetables, or cereal products should be appropriately managed or recovered. The respondents indicated composting (more than 60%) as the main direction of waste management in all categories. Animal feed and landfill sites were the other indicated directions of management. Prevention and minimization of loss generation are important in every stage of production as well as in basic production. When possessing the knowledge on the reasons for loss generation, we may introduce the preventive measures, mainly connected with the appropriate conditions and methods of the storage. Production of fruit and vegetables, food cereals or oilseeds affects the natural environment via intake of nutrients being contained in the soil, use of the resources of water, fertilizers and food protection products, and energy. The limitation of the mentioned effects requires the introduction of techniques and methods for cultivation being friendly to the environment and counteracting losses and waste of agricultural raw materials as well as the appropriate management of food waste in every stage of the agri-food supply chain. The link to basic production includes obtaining a vegetal raw material and its storage in agricultural farm and transport to a collecting point. The starting point is when the plants are ready to be harvested; the stage before harvesting is not considered in the system of measuring and monitoring the food losses. The successive stage is the transport of the collected crops to the collecting point or its storage and transport. The moment, at which the raw material enters the stage of processing, i.e. its receipt at the gate of the processing plant, is considered as a final point of basic production. Processing is understood as the change of the raw material into food products. According to the Regulation (EC) No 178/2002 of the European Parliament and of the Council of 28 January 2002, Art. 2, “food” means any substance or product, intended to be, or reasonably expected to be consumed by humans. It was determined (for the needs of the present studies) when raw material is considered as a food; it is the moment when the plants (fruit, vegetables, cereals, oilseeds), after being harvested, arrive at storehouses. The aim of the studies was to determine the reasons for loss generation and to analyze the directions of their management in basic vegetal production in Poland in the years 2017 and 2018. The studies on food losses and waste in basic vegetal production were carried out in three sectors – fruit and vegetables, cereals and oilseeds. The studies of the basic production were conducted during the period of March-May 2019 at the territory of the whole country on a representative trail of 250 farms in each sector. The surveys were carried out using the questionnaires by the PAPI (Paper & Pen Personal Interview) method; the pollsters conducted the direct questionnaire interviews. From the conducted studies, it is followed that in 19% of the examined farms, any losses were not recorded during preparation, loading, and transport of the raw material to the manufacturing plant. In the farms, where the losses were indicated, the main reason in production of fruit and vegetables was rotting and it constituted more than 20% of the reported reasons, while in the case of cereals and oilseeds’ production, the respondents identified damages, moisture, and pests as the most frequent reason. The losses and waste, generated in vegetal production as well as in processing and trade of fruit and vegetables, or cereal products should be appropriately managed or recovered. The respondents indicated composting (more than 60%) as the main direction of waste management in all categories. Animal feed and landfill sites were the other indicated directions of management. Prevention and minimization of loss generation are important in every stage of production as well as in basic production. When possessing the knowledge on the reasons for loss generation, we may introduce the preventive measures, mainly connected with the appropriate conditions and methods of the storage. ACKNOWLEDGEMENT The article was prepared within the project: "Development of a waste food monitoring system and an effective program to rationalize losses and reduce food waste", acronym PROM implemented under the STRATEGIC SCIENTIFIC AND LEARNING PROGRAM - GOSPOSTRATEG financed by the National Center for Research and Development in accordance with the provisions of Gospostrateg1 / 385753/1/2018

Keywords: food losses, food waste, PAP method, vegetal production

Procedia PDF Downloads 112
1753 Efficacy of Different Pest Control Strategies against Citrus Rind Borer (Prays Eendolemma Diakonoff) Infesting Pummelo (Citrus maxima)

Authors: Larry V. Aceres, Jesryl B. Paulite, Emelie M. Pelicano, J. A. Esteban, Mamangun

Abstract:

Citrus rind borer still the most important pest infesting pummelo in the Philippines particularly in the Davao region. Hence, management of the pest is very important for successful pummelo production. This study was conducted to assess the effectiveness of the different control strategies against citrus rind borer; to determine the best treatment in controlling citrus rind borer; and to calculate the profitability of the various treatments in pummelo production. The experiment was laid-out in Completely Randomized Design (CRD) with five treatments replicated three times. The treatments were: T1- curry tree leaf leachate, T2- neem tree leaf leachate, T3- bagging with an ordinary net, T4- treated check (chlorpyrifos & betacyflutrin) and T5- untreated check. Data were analyzed using the Analysis of Variance and the differences among treatment means were computed using the Tukey’s Honest Significant Difference. The results of the study revealed that the curry tree leaf leachate and bagging treatments provide significant protection to the pummelo fruits which is comparable with the treated check (chlorpyrifos & betacyflutrin). Neem tree leaf leachate is not effective in controlling citrus rind borer which is comparable with the untreated check. In cost and return analysis, the most economical and effective is the bagging treatment using ordinary net.

Keywords: curry tree, neem tree, bagging, citrus rind borer

Procedia PDF Downloads 321
1752 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market

Authors: Brian Basvi

Abstract:

A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.

Keywords: fundamental analysis, stock valuation, EPS, share pricing

Procedia PDF Downloads 25
1751 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 473
1750 Preventive Effect of Zinc on Nickel Hepatotoxicity and Nephrotoxicity in Albino (Wistar) Rats

Authors: Zine Kechrid, Samira Bouhalit

Abstract:

Aim: We studied the effect of intraperitonial zinc treatment on nickel sulphate-induced hepatotoxicity and nephrotoxicity in Wistar strain male albino rats. Materials and Methods: Liver and kidney dysfunction parameters represented by aspartate transaminase (AST), alanine transaminase (ALT), alkaline phosphatase (ALP), blood glucose, serum total protein, serum urea, serum creatinine, and serum belurebin were estimated. Liver glutathione level, catalase and GPx activities were also determined in liver as indicators of oxidative damage. Result: Nickel treatment led to high serum glucose concentration and produced hepatotoxicity and nephrotoxicity characterized by increasing GPT, GOT and alkaline phosphatase activities, serum total protein, serum urea, serum creatinine and serum belurebin concentrations. In addition, liver glutathione level, catalase and GSH-Px activities diminished due to high lipid peroxidation. The simultaneous administration of zinc with nickel sulphate resulted in a remarkable improvement of the previous parameters compared with rats treated with nickel alone. Conclusion: In conclusion, nickel sulphate led to liver and kidney dysfunctions and hepatic lipid peroxidation in animals, but simultaneous treatment with zinc offers a relative protection against nickel induced hepatotoxicity, nephrotoxicity and lipid peroxidation.

Keywords: nickel, zinc, rats, GOT, GPT, nephrotoxicity, hepatotoxicity

Procedia PDF Downloads 445
1749 The Association between ABO-Rh Blood Groups and the Risk of COVID-19 Infection

Authors: Abbas Sedighinejad, Hossein Khoshrang, Mohammad Haghighi, Ali Ashraf, Mostafa Saeedinia, Gelareh Biazar, Zahra Atrkarroushan, Mahdi Ajdadi

Abstract:

Background: Coronavirus disease 2019 (COVID-19) as an alarming attack broke out in China and spread rapidly worldwide. Objectives: Based on a theory indicating the correlation between some viral diseases and blood types, we investigated the relationship between blood groups and coronavirus infection risk in Guilan Province, Iran. Methods: Retrospectively, all the files of the admitted patients with suspected COVID-19, in peak conditions of the disease between March 1 and May 30, 2020, were reviewed using the Census method. The required data, including epidemiological and clinical information and outcomes, were obtained from electronic records. Results: A total of 249 cases were analyzed, of whom 109 were collected from governmental centers, and the rest were collected from private hospitals. The most common co-morbidity was diabetes with 71 (37.6%) cases and the main symptom at the admission time was dyspnea with 170 (24.5%) cases. Of the total patients, 155 (62.2%) were discharged, and the rest died. The most common blood group among our patients was O Rh-positive with 91 (36.5%) cases. No meaningful correlation was found between outcomes and blood groups in terms of ABO types (P = 0.89) or Rh factor (P = 0.456). The Rh-positive proportion was significantly higher in the COVID-19 cases than in the general population (P = 0.038). Conclusions: We found that the Rh-positive proportion was significantly higher in the COVID-19 cases than in the healthy individuals. However, no correlation was observed between the groups regarding ABO typing.

Keywords: ABO blood group, COVID 19, association, personal protection

Procedia PDF Downloads 59
1748 Global Gender Differences in Job Satisfaction in the Hospitality Industry

Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller

Abstract:

Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.

Keywords: job satisfaction, gender, hospitality, global comparisons

Procedia PDF Downloads 130
1747 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 147
1746 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 289
1745 Child Homicide Victimization and Community Context: A Research Note

Authors: Bohsiu Wu

Abstract:

Among serious crimes, child homicide is a rather rare event. However, the killing of children stirs up a special type of emotion in society that pales other criminal acts. This study examines the relevancy of three possible community-level explanations for child homicide: social deprivation, female empowerment, and social isolation. The social deprivation hypothesis posits that child homicide results from lack of resources in communities. The female empowerment hypothesis argues that a higher female status translates into a higher level of capability to prevent child homicide. Finally, the social isolation hypothesis regards child homicide as a result of lack of social connectivity. Child homicide data, aggregated by US postal ZIP codes in California from 1990 to 1999, were analyzed with a negative binomial regression. The results of the negative binomial analysis demonstrate that social deprivation is the most salient and consistent predictor among all other factors in explaining child homicide victimization at the ZIP-code level. Both social isolation and female labor force participation are weak predictors of child homicide victimization across communities. Further, results from the negative binomial regression show that it is the communities with a higher, not lower, degree of female labor force participation that are associated with a higher count of child homicide. It is possible that poor communities with a higher level of female employment have a lesser capacity to provide the necessary care and protection for the children. Policies aiming at reducing social deprivation and strengthening female empowerment possess the potential to reduce child homicide in the community.

Keywords: child homicide, deprivation, empowerment, isolation

Procedia PDF Downloads 190
1744 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 252
1743 Conflicts and Similarities among Energy Law, Environmental Law and Economic Aspects

Authors: Bahareh Arghand, Seyed Abbas Poorhashemi, Ramin Roshandel

Abstract:

Nowadays, Economic growth and the increasing use of fossil fuel have caused major damages to environment. Therefore, international law has tried to codify the rules and regulations and identify legal principles to decrease conflict of interests between energy law and environmental law. The open relationship between energy consumption and the law of nature has been ignored for years, because the focus of energy law has been on an affordable price of a reliable supply of energy; while the focus of environmental law was on protection of the nature. In fact, the legal and overall policies of energy are based on Sic Omnes and inter part for governments whereas environmental law is based on common interests and Erga Omnes. The relationship between energy law, environmental law and economic aspects is multilateral, complex and important. Moreover, they influence each other. There are similarities in the triangle of energy, environment and economic aspects and in some cases there are conflict of interest but their conflicts are in goals not in practice and their legal jurisdiction is in international law. The development of national and international rules and regulations relevant to energy-environment has been done by separate sectors, whereas sustainable development principle, especially in the economic sector, requires environmental considerations. It is an important turning point to integrate and decrease conflict of interest among energy law, environmental law and economic aspects. The present study examines existing legal principles on energy and the environment and identifies the similarities and conflicts based on the descriptive-analytic study. The purpose of investigating these legal principles is to integrate and decrease conflict of interest between energy law and environmental law.

Keywords: energy law, environmental law, erga omnes, sustainable development

Procedia PDF Downloads 378
1742 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 238
1741 The Impact of Bitcoin and Cryptocurrency on the Development of Community

Authors: Felib Ayman Shawky Salem

Abstract:

Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics

Procedia PDF Downloads 30
1740 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 376
1739 Effect of Visnagin on Altered Steroidogenesis and Spermatogenesis, and Testicular Injury Induced by the Heavy Metal Lead

Authors: Saleh N. Maodaa

Abstract:

Background: Lead (Pb) is an environmental pollutant causing serious health problems, including impairment of reproduction. Visnagin (VIS) is a furanochromone with promising antioxidant and anti-inflammatory effects; however, its protective efficacy against Pb toxicity has not been investigated. Objective: This study evaluated the protective effect of VIS on Pb reproductive toxicity, impaired steroidogenesis and spermatogenesis, oxidative stress and inflammation. Methods: Rats received VIS (30 or 60 mg/kg) and 50 mg/kg lead acetate for 3 weeks, and blood and testes samples were collected. Results: Pb intoxication impaired the pituitary-testicular axis (PTA), manifested by the decreased serum levels of gonadotropins and testosterone. Pb decreased sperm count, motility and viability, increased sperm abnormalities, and downregulated the steroidogenesis markers StAR, CYP17A1, 3β-HSD and 17β-HSD in the testis of rats. VIS significantly increased serum gonadotropins and testosterone, alleviated sperm parameters and upregulated steroidogenesis. In addition, VIS decreased pro-inflammatory cytokines, testicular lipid peroxidation and DNA fragmentation, downregulated Bax, and enhanced antioxidants and Bcl-2 Conclusion: These results demonstrate the protective effect of VIS against Pb reproductive toxicity in rats. VIS improved serum gonadotropins and testosterone, enhanced steroidogenesis and spermatogenesis, and attenuated oxidative injury, inflammation and apoptosis. Therefore, VIS is a promising candidate for the protection against Pb-induced reproduction impairment.

Keywords: pituitary-gonadal axis, cytokines, DNA damage, apoptosis

Procedia PDF Downloads 92
1738 Transformation of Industrial Policy towards Industry 4.0 and Its Impact on Firms' Competition

Authors: Arūnas Burinskas

Abstract:

Although Europe is on the threshold of a new industrial revolution called Industry 4.0, many believe that this will increase the flexibility of production, the mass adaptation of products to consumers and the speed of their service; it will also improve product quality and dramatically increase productivity. However, as expected, all the benefits of Industry 4.0 face many of the inevitable changes and challenges they pose. One of them is the inevitable transformation of current competition and business models. This article examines the possible results of competitive conversion from the classic Bertrand and Cournot models to qualitatively new competition based on innovation. Ability to deliver a new product quickly and the possibility to produce the individual design (through flexible and quickly configurable factories) by reducing equipment failures and increasing process automation and control is highly important. This study shows that the ongoing transformation of the competition model is changing the game. This, together with the creation of complex value networks, means huge investments that make it particularly difficult for small and medium-sized enterprises. In addition, the ongoing digitalization of data raises new concerns regarding legal obligations, intellectual property, and security.

Keywords: Bertrand and Cournot Competition, competition model, industry 4.0, industrial organisation, monopolistic competition

Procedia PDF Downloads 135
1737 Criminal Responsibility of Minors in Russia: The Age of Liability and Penalties

Authors: Natalia Selezneva

Abstract:

The level of crime depends on a number of factors, such as political and economic instability, social inequality and ineffective legislation. A special place in the overall level of crime takes juvenile delinquency. United Nations Standard Minimum developed rules for the administration of juvenile justice (The Beijing Rules), in order to ensure the rights of juvenile offenders under the various legal systems. Most countries support these recommendations, and Russia is no exception. Russia's criminal code establishes the minimum age of criminal liability; types of crimes for which the possible involvement of minors to justice; punishment; sentencing and execution of punishment for minors. However, these provisions cause heated debates in the scientific literature. The high level of juvenile crime indicates the ineffectiveness of legal regulation of criminal liability of minors. In order to ensure compliance with international standards require new and modern approaches to improve national legislation and practice of its application. Achieving this goal will be achieved through the following tasks: 1. Create sub-branches of law regulating the legal status of minors; 2. Improving the types of penalties; 3. The possibility of using alternative measures; 4. The introduction of the procedure of extrajudicial settlement of the conflict. The criminal law of each country depends on the historical, national and cultural characteristics. The development of the Russian legislation taking into account international experience is extremely essential and will be a new stage in the formation of a legal state, especially in the sphere of protection of the rights of juvenile offenders.

Keywords: criminal law, juvenile offender, punishment, the age of criminal responsibility

Procedia PDF Downloads 529