Search results for: biodiversity threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1231

Search results for: biodiversity threats

901 The Perspective of Waste Frying Oil in São Paulo and Its Dimensions in the Reverse Logistics of the Production of Biodiesel

Authors: Max Filipe Goncalves, Alessandra Concilio, Rodrigo Shimada

Abstract:

The waste frying oil is highly pollutant when disposed incorrectly in the environment. Is necessary search of the Reverse Logistics to identify how can be structure to return the waste like this to productive chain and to be used in the new process. In this context, the objective of this paper is to analyze the perspective of the waste frying oil in São Paulo, and its dimensions in the production of biodiesel. Subjacent factors such as the agents, motivators and legal aspects were analyzed to demonstrate it. Then, the SWOT matrix was built with the aspects observed and the forces, weaknesses, opportunities and threats of the reverse logistic chain in São Paulo.

Keywords: biodiesel, perspective, reverse logistic, WFO

Procedia PDF Downloads 207
900 Place and Importance of Goats in the Milk Sector in Algeria

Authors: Tennah Safia, Azzag Naouelle, Derdour Salima, Hafsi Fella, Laouadi Mourad, Laamari Abdalouahab, Ghalmi Farida, Kafidi Nacerredine

Abstract:

Currently, goat farming is widely practiced among the rural population of Algeria. Although milk yield of goats is low (110 liters per goat and per year on average), this milk partly ensures the feeding of small children and provides raw milk, curd, and fermented milk to the whole family. In addition, given its investment cost, which is ten times lower than that of a cow, this level of production is still of interest. This interest is reinforced by the qualities of goat's milk, highly sought after for its nutritional value superior to that of cow's milk. In the same way, its aptitude for the transformation, in particular in quality cheeses, is very sought after. The objective of this study is to give the situation of goat milk production in rural areas of Algeria and to establish a classification of goat breeds according to their production potential. For this, a survey was carried out with goat farmers in Algerian steppe. Three indigenous breeds were encountered in this study: the breed Arabia, Mozabite, and Mekatia; Arabia being the most dominant. The Mekatia breed and the Mozabite breed appear to have higher production and milking abilities than other local breeds. They are therefore indicated to play the role of local dairy breeds par excellence. The other breed that could be improved milk performance is the Arabia breed. There, however, the milk performance of this breed is low. However, in order to increase milk production, uncontrolled crosses with imported breeds (mainly Saanen and Alpine) were carried out. The third population that can be included in the category for dairy production is the dairy breed group of imported origin. There are farms in Algeria composed of Alpine and Saanen breeds born locally. Improved milk performance of local goats, Crusader population, and dairy breeds of imported origin could be done by selection. For this, it is necessary to set up a milk control to detect the best animals. This control could be carried out among interested farmers in each large goat breeding area. In conclusion, sustained efforts must be made to enable the sustainable development of the goat sector in Algeria. It will, therefore, be necessary to deepen the reflection on a national strategy to valorize goat's milk, taking into account the specificities of the environment, the genetic biodiversity, and the eating habits of the Algerian consumer.

Keywords: goat, milk, Algeria, biodiversity

Procedia PDF Downloads 179
899 Defining a Framework for Holistic Life Cycle Assessment of Building Components by Considering Parameters Such as Circularity, Material Health, Biodiversity, Pollution Control, Cost, Social Impacts, and Uncertainty

Authors: Naomi Grigoryan, Alexandros Loutsioli Daskalakis, Anna Elisse Uy, Yihe Huang, Aude Laurent (Webanck)

Abstract:

In response to the building and construction sectors accounting for a third of all energy demand and emissions, the European Union has placed new laws and regulations in the construction sector that emphasize material circularity, energy efficiency, biodiversity, and social impact. Existing design tools assess sustainability in early-stage design for products or buildings; however, there is no standardized methodology for measuring the circularity performance of building components. Existing assessment methods for building components focus primarily on carbon footprint but lack the comprehensive analysis required to design for circularity. The research conducted in this paper covers the parameters needed to assess sustainability in the design process of architectural products such as doors, windows, and facades. It maps a framework for a tool that assists designers with real-time sustainability metrics. Considering the life cycle of building components such as façades, windows, and doors involves the life cycle stages applied to product design and many of the methods used in the life cycle analysis of buildings. The current industry standards of sustainability assessment for metal building components follow cradle-to-grave life cycle assessment (LCA), track Global Warming Potential (GWP), and document the parameters used for an Environmental Product Declaration (EPD). Developed by the Ellen Macarthur Foundation, the Material Circularity Indicator (MCI) is a methodology utilizing the data from LCA and EPDs to rate circularity, with a "value between 0 and 1 where higher values indicate a higher circularity+". Expanding on the MCI with additional indicators such as the Water Circularity Index (WCI), the Energy Circularity Index (ECI), the Social Circularity Index (SCI), Life Cycle Economic Value (EV), and calculating biodiversity risk and uncertainty, the assessment methodology of an architectural product's impact can be targeted more specifically based on product requirements, performance, and lifespan. Broadening the scope of LCA calculation for products to incorporate aspects of building design allows product designers to account for the disassembly of architectural components. For example, the Material Circularity Indicator for architectural products such as windows and facades is typically low due to the impact of glass, as 70% of glass ends up in landfills due to damage in the disassembly process. The low MCI can be combatted by expanding beyond cradle-to-grave assessment and focusing the design process on disassembly, recycling, and repurposing with the help of real-time assessment tools. Design for Disassembly and Urban Mining has been integrated within the construction field on small scales as project-based exercises, not addressing the entire supply chain of architectural products. By adopting more comprehensive sustainability metrics and incorporating uncertainty calculations, the sustainability assessment of building components can be more accurately assessed with decarbonization and disassembly in mind, addressing the large-scale commercial markets within construction, some of the most significant contributors to climate change.

Keywords: architectural products, early-stage design, life cycle assessment, material circularity indicator

Procedia PDF Downloads 87
898 Soy Candle vs Paraffin Candle

Authors: Otana A. Jakpor

Abstract:

Air pollution is without a doubt one of the gravest environmental threats the world is facing today in terms of its sheer toll on human lives. Each year an estimated 70,000 Americans lose their lives to air pollution -- a number equal to deaths from both breast and prostate cancer combined. Since Americans spend nearly 90% of their time indoors, more research is needed on indoor air pollution and common exposures such as candles. Paraffin wax is a by-product of petroleum, and similarities have been observed between fine particulate emissions from paraffin candles and diesel exhaust. The purpose of this study is to determine whether or not paraffin candles are a major potential source of indoor air pollution. Furthermore, this study aims to determine whether or not soy candles are a safer, cleaner alternative to paraffin candles.

Keywords: soy candle, soy, paraffin candle, paraffin

Procedia PDF Downloads 250
897 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 127
896 Rhizosphere Microbial Communities in Fynbos Endemic Legumes during Wet and Dry Seasons

Authors: Tiisetso Mpai, Sanjay K. Jaiswal, Felix D. Dakora

Abstract:

The South African Cape fynbos biome is a global biodiversity hotspot. This biome contains a diversity of endemic shrub legumes, including Polhillia, Wiborgia, and Wiborgiella species, which are important for ecotourism as well as for improving soil fertility status. This is due to their proven N₂-fixing abilities when in association with compatible soil bacteria. In fact, Polhillia, Wiborgia, and Wiborgiella species have been reported to derive over 61% of their needed nitrogen through biological nitrogen fixation and to exhibit acid and alkaline phosphatase activity in their rhizospheres. Thus, their interactions with soil microbes may explain their survival mechanisms under the continued summer droughts and acidic, nutrient-poor soils in this region. However, information regarding their rhizosphere microbiome is still unavailable, yet it is important for Fynbos biodiversity management. Therefore, the aim of this study was to assess the microbial community structures associated with rhizosphere soils of Polhillia pallens, Polhillia brevicalyx, Wiborgia obcordata, Wiborgia sericea, and Wiborgiella sessilifolia growing at different locations of the South African Cape fynbos, during the wet and dry seasons. The hypothesis is that the microbial communities in these legume rhizospheres are the same type and are not affected by the growing season due to the restricted habitat of these wild fynbos legumes. To obtain the results, DNA was extracted from 0.5 g of each rhizosphere soil using PowerSoil™ DNA Isolation Kit, and sequences were obtained using the 16S rDNA Miseq Illumina technology. The results showed that in both seasons, bacteria were the most abundant microbial taxa in the rhizosphere soils of all five legume species, with Actinobacteria showing the highest number of sequences (about 30%). However, over 19.91% of the inhabitants in all five legume rhizospheres were unclassified. In terms of genera, Mycobacterium and Conexibacter were common in rhizosphere soils of all legumes in both seasons except for W. obcordata soils sampled during the dry season, which had Dehalogenimonas as the major inhabitant (6.08%). In conclusion, plant species and season were found to be the main drivers of microbial community structure in Cape fynbos, with the wet season being more dominant in shaping microbial diversity relative to the dry season. Wiborgia obcordata had a greater influence on microbial community structure than the other four legume species.

Keywords: 16S rDNA, Cape fynbos, endemic legumes, microbiome, rhizosphere

Procedia PDF Downloads 150
895 Sex Positions Decisions and Negotiations of Sexual Pleasure and Gender in Ghana

Authors: Daniel Y. Fiaveh, Chimaraoke O. Izugbara

Abstract:

Based on the narratives of 20 women and 16 men, the paper explores how knowing more about the factors that trigger sex positions decisions advance knowledge of male and female sexuality, and how these translate into higher levels of female sexual negotiations in Ghana. Findings demonstrated that the willingness to perform sex positions or not were gendered and derive, at least in part, from differences in demographic profiles (such as age, gender, and marriage), beliefs associated with sexual practices (such as anal sex), the desire to maximize sexual pleasure, and sexual myths and misconceptions e.g. fear of infecundity. The women were not passive to sex positions decisions and engaged in a dialogical sexual encounter with men including threats of sexual refusal in negotiating sex.

Keywords: sexual positions, sexual pleasure, masculinity, femininity, Ghana

Procedia PDF Downloads 478
894 Spatio-Temporal Analysis of Land Use Land Cover Change Using Remote Sensing and Multispectral Satellite Imagery of Islamabad Pakistan

Authors: Basit Aftab, Feng Zhongke

Abstract:

The land use/land cover change (LULCC) is a significant indicator sensitive to an area's environmental changes. As a rapidly developing capital city near the Himalayas Mountains, the city area of Islamabad, Pakistan, has expanded dramatically over the past 20 years. In order to precisely measure the impact of urbanization on the forest and agricultural lands, the Spatio-temporal analysis of LULCC was utilized, which helped us to know the impacts of urbanization, especially on ecosystem processes, biological cycles, and biodiversity. The Islamabad region's Multispectral Satellite Images (MSI) for 2000, 2010, and 2020 were employed as the remote sensing data source. Local documents of city planning, forest inventory and archives in the agriculture management departments were included to verify the image-derived result. The results showed that from 2000 to 2020, the built-up area increased to 48.3% (505.02 Km2). Meanwhile, the forest, agricultural, and barre land decreased to 28.9% (305.64 Km2), 10.04% (104.87 Km2), and 11.61% (121.30 Km2). The overall percentage change in land area between 2000 – 2020 was recorded maximum for the built-up (227.04%). Results revealed that the increase in the built-up area decreased forestland, barren, and agricultural lands (-0.36, -1.00 & -0.34). The association of built-up with respective years was positively linear (R2 = 0.96), whereas forestland, agricultural, and barren lands association with years were recorded as negatively linear (R2 = -0.29, R2 = -0.02, and R2 = -0.96). Large-scale deforestation leads to multiple negative impacts on the local environment, e.g., water degradation and climate change. It would finally affect the environment of the greater Himalayan region in some way. We further analyzed the driving forces of urbanization. It was determined by economic expansion, climate change, and population growth. We hope our study could be utilized to develop efforts to mitigate the consequences of deforestation and agricultural land damage, reducing greenhouse gas emissions while preserving the area's biodiversity.

Keywords: urbanization, Himalaya mountains, landuse landcover change (LULCC), remote sensing., multi-spectral satellite imagery

Procedia PDF Downloads 45
893 Absence of Vancomycin-Resistant Enterococci Amongst Urban and Rural Hooded Crows in Hungary

Authors: Isma Benmazouz, Bálint Joszef Nagy, Bence Bálacs, Gábor Kardos, László Kővér

Abstract:

Vancomycin-resistant enterococci (VRE) are among the major nosocomial threats, which have a potential for zoonotic transmission due to the ubiquity of enterococci in the environment and in animal microbiota, e.g., wild birds. . In order to assess the prevalence in an urbanized bird species, 221 fecal samples were collected from Hooded crows (Corvus cornix) in 2020. Fecal samples were screened using VRE agar plates. None of the samples yielded VRE. The absence of VRE isolates in sampled urban hooded crows indicates that crows residing in the city do not necessarily constitute a reservoir of VREs.

Keywords: resistance, crows, Enterococci, wild birds

Procedia PDF Downloads 130
892 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 381
891 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 381
890 The Effect of Air Entraining Agents on Compressive Strength

Authors: Demet Yavuz

Abstract:

Freeze-thaw cycles are one of the greatest threats to concrete durability. Lately, protection against this threat excites scientists’ attention. Air-entraining admixtures have been widely used to produce freeze-thaw resistant at concretes. The use of air-entraining agents (AEAs) enhances not only freeze-thaw endurance but also the properties of fresh concrete such as segregation, bleeding and flow ability. This paper examines the effects of air-entraining on compressive strength of concrete. Air-entraining is used between 0.05% and 0.4% by weight of cement. One control and four fiber reinforced concrete mixes are prepared and three specimens are tested for each mix. It is concluded from the test results that when air entraining is increased the compressive strength of concrete reduces for all mixes with AEAs.

Keywords: concrete, air-entraining, compressive strength, mechanical properties

Procedia PDF Downloads 275
889 An Overview of Adaptive Channel Equalization Techniques and Algorithms

Authors: Navdeep Singh Randhawa

Abstract:

Wireless communication system has been proved as the best for any communication. However, there are some undesirable threats of a wireless communication channel on the information transmitted through it, such as attenuation, distortions, delays and phase shifts of the signals arriving at the receiver end which are caused by its band limited and dispersive nature. One of the threat is ISI (Inter Symbol Interference), which has been found as a great obstacle in high speed communication. Thus, there is a need to provide perfect and accurate technique to remove this effect to have an error free communication. Thus, different equalization techniques have been proposed in literature. This paper presents the equalization techniques followed by the concept of adaptive filter equalizer, its algorithms (LMS and RLS) and applications of adaptive equalization technique.

Keywords: channel equalization, adaptive equalizer, least mean square, recursive least square

Procedia PDF Downloads 448
888 An Artificial Neural Network Model Based Study of Seismic Wave

Authors: Hemant Kumar, Nilendu Das

Abstract:

A study based on ANN structure gives us the information to predict the size of the future in realizing a past event. ANN, IMD (Indian meteorological department) data and remote sensing were used to enable a number of parameters for calculating the size that may occur in the future. A threshold selected specifically above the high-frequency harvest reached the area during the selected seismic activity. In the field of human and local biodiversity it remains to obtain the right parameter compared to the frequency of impact. But during the study the assumption is that predicting seismic activity is a difficult process, not because of the parameters involved here, which can be analyzed and funded in research activity.

Keywords: ANN, Bayesion class, earthquakes, IMD

Procedia PDF Downloads 123
887 Low Carbon Tourism Management: Strategies for Climate-Friendly Tourism of Koh Mak, Thailand

Authors: Panwad Wongthong, Thanan Apivantanaporn, Sutthiwan Amattayakul

Abstract:

Nature-based tourism is one of the fastest growing industries that can bring in economic benefits, improve quality of life and promote conservation of biodiversity and habitats. As tourism develops, substantial socio-economic and environmental costs become more explicit. Particularly in island destinations, the dynamic system and geographical limitations makes the intensity of tourism development and severity of the negative environmental impacts greater. The current contribution of the tourism sector to global climate change is established at approximately 5% of global anthropogenic CO2 emissions. In all scenarios, tourism is anticipated to grow substantially and to account for an increasingly large share of global greenhouse gas emissions. This has prompted an urgent call for more sustainable alternatives. This study selected a small island of Koh Mak in Thailand as a case study because of its reputation of being laid back, family oriented and rich in biodiversity. Importantly, it is a test platform for low carbon tourism development project supported by the Designated Areas for Sustainable Tourism Administration (DASTA) in collaboration with the Institute for Small and Medium Enterprises Development (ISMED). The study explores strategies for low carbon tourism management and assesses challenges and opportunities for Koh Mak to become a low carbon tourism destination. The goal is to identify suitable management approaches applicable for Koh Mak which may then be adapted to other small islands in Thailand and the region. Interventions/initiatives to increase energy efficiency in hotels and resorts; cut carbon emissions; reduce impacts on the environment; and promote conservation will be analyzed. Ways toward long-term sustainability of climate-friendly tourism will be recommended. Recognizing the importance of multi-stakeholder involvement in the tourism sector, findings from this study can reward Koh Mak tourism industry with a triple-win: cost savings and compliance with higher standards/markets; less waste, air emissions and effluents; and better capabilities of change, motivation of business owners, staff, tourists as well as residents. The consideration of climate change issues in the planning and implementation of tourism development is of great significance to protect the tourism sector from negative impacts.

Keywords: climate change, CO2 emissions, low carbon tourism, sustainable tourism management

Procedia PDF Downloads 280
886 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity

Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman

Abstract:

This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.

Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing

Procedia PDF Downloads 64
885 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 124
884 Influence of the Location of Flood Embankments on the Condition of Oxbow Lakes and Riparian Forests: A Case Study of the Middle Odra River Beds on the Example of Dragonflies (Odonata), Ground Beetles (Coleoptera: Carabidae) and Plant Communities

Authors: Magda Gorczyca, Zofia Nocoń

Abstract:

Past and current studies from different countries showed that river engineering leads to environmental degradation and extinction of many species - often those protected by local and international wildlife conservation laws. Through the years, the main focus of rivers utilization has shifted from industrial applications to recreation and wildlife preservation with a focus on keeping the biodiversity which plays a significant role in preventing climate changes. Thus an opportunity appeared to recreate flooding areas and natural habitats, which are very rare in the scale of Europe. Additionally, river restoration helps to avoid floodings and periodic droughts, which are usually very damaging to the economy. In this research, the biodiversity of dragonflies and ground beetles was analyzed in the context of plant communities and forest stands structure. Results were enriched with data from past and current literature. A comparison was made between two parts of the Odra river. A part where oxbow lake and riparian forest were separated from the river bed by embankment and a part of the river with floodplains left intact. Validity assessment of embankments relocation was made based on the research results. In the period between May and September, insects were collected, phytosociological analysis were taken, and forest stand structure properties were specified. In the part of the river not separated by the embankments, rare and protected species of plants were spotted (e.g., Trapanatans, Salvinianatans) as well as greater species and quantitive diversity of dragonfly. Ground beetles fauna, though, was richer in the area separated by the embankment. Even though the research was done during only one season and in a limited area, the results can be a starting point for further extended research and may contribute to acquiring legal wildlife protection and restoration of the researched area. During the research, the presence of invasive species Impatiens parviflora, Echinocystislobata, and Procyonlotor were observed, which may lead to loss of the natural values of the researched areas.

Keywords: carabidae, floodplains, middle Odra river, Odonata, oxbow lakes, riparian forests

Procedia PDF Downloads 139
883 Data Science Inquiry to Manage Football Referees’ Careers

Authors: Iñaki Aliende, Tom Webb, Lorenzo Escot

Abstract:

There is a concern about the decrease in football referees globally. A study in Spain has analyzed the factors affecting a referee's career over the past 30 years through a survey of 758 referees. Results showed the impact of factors such as threats, education, initial vocation, and dependents on a referee's career. To improve the situation, the federation needs to provide better information, support young referees, monitor referees, and raise public awareness of violence toward referees. The study also formed a comprehensive model for federations to enhance their officiating policies by means of data-driven techniques that can serve other federations to improve referees' careers.

Keywords: data science, football referees, sport management, sport careers, survival analysis

Procedia PDF Downloads 98
882 Assessment of Marine Diversity on Rocky Shores of Triporti, Vlore, Albania

Authors: Ina Nasto, Denada Sota, Kerol Sacaj, Brunilda Veshaj, Hajdar Kicaj

Abstract:

Rocky shores are often used as models to describe the dynamics of biodiversity around the world, making them one of the most studied marine habitats and their communities. The variability in the number of species and the abundance of hard-bottom benthic animal communities on the coast of Triporti, north of the Bay of Vlora, Albania is described in relation to environmental variables using multivariate analysis. The purpose of this study is to monitor the species composition, quantitative characteristics, and seasonal variations of the benthic macroinvertebrate populations of the shallow rocky shores of the Triportit-Vlora area, as well as the assessment of the ecological condition of these populations. The rocky coast of Triport, with a length of 7 km, was divided into three sampling stations, with three transects each of 50m. The monitoring of benthic macroinvertebrates in these areas was carried out in two seasons, spring and summer (June and August 2021). In each station and sampling season, estimates of the total and average density for each species, the presence constant, and the assessment of biodiversity were calculated using the Shannon–Wiener and the Simpson index. The species composition, the quantitative characteristics of the populations, and the indicators mentioned above were analyzed in a comparative way, both between the seasons within one station and between the three stations with each other. Statistical processing of the data was carried out to analyze the changes between the seasons and between the sampling stations for the species composition, population density, as well as correlation between them. A total of 105 benthic macroinvertebrate taxa were found, dominated by Molluscs, Annelids, and Arthropods. The small density of species and the low degree of stability of the macrozoobenthic community are indicators of the poor ecological condition and environmental impact in the studied areas. Algal cover, the diversity of coastal microhabitats, and the degree of coastal exposure to waves play an important role in the characteristics of macrozoobenthos populations in the studied areas. Also, the rocky shores are of special interest because, in the infralittoral of these areas, there are dense kelp forests with Gongolaria barbata, Ericaria crinita as well as fragmented areas with Posidonia oceanica that reach the coast, priority habitats of special conservation importance in the Mediterranean.

Keywords: Macrozoobenthic communities, Shannon–Wiener, Triporti, Vlore, rocky shore

Procedia PDF Downloads 94
881 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 241
880 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 506
879 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156
878 Effect of Waste Dumping on Groundwater Quality at Guntun Layi Funtua, Katsina State

Authors: Isiya Aminu Dabai, Adebola Kayode, Adeosun Kayode Daniel

Abstract:

Rural water supply relies mainly on groundwater exploitation, because it is more accessible, reliable, cheaper to develop and maintain, also with good quality compared to the surface water. Despite these advantages, groundwater has come under pollution threats like waste dumps, mineral exploitation, industrialization etc. This study investigates the effects of an open dumping to the surrounding groundwater. Ten hand dug well water samples were collected from the surroundings and tested. The average result shows that temperature, colour and turbidity to be 8.50 c, 6.1 TCU and 3.1 NTU respectively and pH, conductivity, total dissolved solids, chloride content and hardness to be 7.2, 4.78, 1.8, 5.7, and 3.4 respectively while in the bacteriological test well no. 1, 2, 3, and 5 shows the presence of coliforms and E. Coli bacteria.

Keywords: groundwater, pollution, waste, dump site, unsafe, quality

Procedia PDF Downloads 679
877 Scientific Forecasting in International Relations

Authors: Djehich Mohamed Yousri

Abstract:

In this research paper, the future of international relations is believed to have an important place on the theoretical and applied levels because policy makers in the world are in dire need of such analyzes that are useful in drawing up the foreign policies of their countries, and protecting their national security from potential future threats, and in this context, The topic raised a lot of scientific controversy and intellectual debate, especially in terms of the extent of the effectiveness, accuracy, and ability of foresight methods to identify potential futures, and this is what attributed the controversy to the scientific foundations for foreseeing international relations. An arena for intellectual discussion between different thinkers in international relations belonging to different theoretical schools, which confirms to us the conceptual and implied development of prediction in order to reach the scientific level.

Keywords: foresight, forecasting, international relations, international relations theory, concept of international relations

Procedia PDF Downloads 214
876 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 642
875 Calculation of Methane Emissions from Wetlands in Slovakia via IPCC Methodology

Authors: Jozef Mindas, Jana Skvareninova

Abstract:

Wetlands are a main natural source of methane emissions, but they also represent the important biodiversity reservoirs in the landscape. There are about 26 thousands hectares of wetlands in Slovakia identified via the wetlands monitoring program. Created database of wetlands in Slovakia allows to analyze several ecological processes including also the methane emissions estimate. Based on the information from the database, the first estimate of the methane emissions from wetlands in Slovakia has been done. The IPCC methodology (Tier 1 approach) has been used with proposed emission factors for the ice-free period derived from the climatic data. The highest methane emissions of nearly 550 Gg are associated with the category of fens. Almost 11 Gg of methane is emitted from bogs, and emissions from flooded lands represent less than 8 Gg.

Keywords: bogs, methane emissions, Slovakia, wetlands

Procedia PDF Downloads 282
874 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 47
873 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 28
872 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 165