Search results for: demolition threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1093

Search results for: demolition threat

763 Biomedical Countermeasures to Category a Biological Agents

Authors: Laura Cochrane

Abstract:

The United States Centers for Disease Control and Prevention has established three categories of biological agents based on their ease of spread and the severity of the disease they cause. Category A biological agents are the highest priority because of their high degree of morbidity and mortality, ease of dissemination, the potential to cause social disruption and panic, special requirements for public health preparedness, and past use as a biological weapon. Despite the threat of Category A biological agents, opportunities for medical intervention exist. This work summarizes public information, consolidated and reviewed across the situational usefulness and disease awareness to offer discussion to three specific Category A agents: anthrax (Bacillus anthracis), botulism (Clostridium botulinum toxin), and smallpox (variola major), and provides an overview on the management of medical countermeasures available to treat these three (3) different types of pathogens. The medical countermeasures are discussed in the setting of pre-exposure prophylaxis, post-exposure prophylaxis, and therapeutic treatments to provide a framework for requirements in public health preparedness.

Keywords: anthrax, botulism, smallpox, medical countermeasures

Procedia PDF Downloads 51
762 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 325
761 The Gezi Park Protests in the Columns

Authors: Süleyman Hakan Yilmaz, Yasemin Gülsen Yilmaz

Abstract:

The Gezi Park protests of 2013 have significantly changed the Turkish agenda and its effects have been felt historically. The protests, which rapidly spread throughout the country, were triggered by the proposal to recreate the Ottoman Army Barracks to function as a shopping mall on Gezi Park located in Istanbul’s Taksim neighbourhood despite the oppositions of several NGOs and when trees were cut in the park for this purpose. Once the news that construction vehicles entered the park on May 27 spread on social media, activists moved into the park to stop the demolition, against whom the police used disproportioned force. With this police intervention and the then prime-minister Tayyip Erdoğan's insistent statements about the construction plans, the protests turned into anti-government demonstrations, which then spread to the rest of the country, mainly in big cities like Ankara and Izmir. According to the Ministry of Internal Affairs’ June 23rd reports, 2.5 million people joined the demonstrations in 79 provinces, that is all of them, except for the provinces of Bayburt and Bingöl, while even more people shared their opinions via social networks. As a result of these events, 8 civilians and 2 security personnel lost their lives, namely police chief Mustafa Sarı, police officer Ahmet Küçükdağ, citizens Mehmet Ayvalıtaş, Abdullah Cömert, Ethem Sarısülük, Ali İsmail Korkmaz, Ahmet Atakan, Berkin Elvan, Burak Can Karamanoğlu, Mehmet İstif, and Elif Çermik, and 8163 more were injured. Besides being a turning point in Turkish history, the Gezi Park protests also had broad repercussions in both in Turkish and in global media, which focused on Turkey throughout the events. Our study conducts content analysis of three Turkish reporting newspapers with varying ideological standpoints, Hürriyet, Cumhuriyet ve Yeni Şafak, in order to reveal their basic approach to columns casting in context of the Gezi Park protests. Columns content relating to the Gezi protests were treated and analysed for this purpose. The aim of this study is to understand the social effects of the Gezi Park protests through media samples with varying political attitudes towards news casting.

Keywords: Gezi Park, media, news casting, columns

Procedia PDF Downloads 407
760 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 247
759 Comparing of Hypogonadism Frequency between Metabolic Syndrome Men with Normal Men

Authors: Armaghan Moravej Aleali, Seyed Bahman Ghaderian, Homeira Rashidi, Mahmoud Mapar

Abstract:

Background and Objective The metabolic syndrome (MetS) is considered the most important public health threat of the 21st century. This syndrome is characterized by a cluster of cardiovascular risk factors including increased central abdominal obesity, elevated triglycerides, reduced high-density lipoprotein, high blood pressure, increased fasting glucose, and hyperinsulinemia. MetS has been associated with hypogonadism and erectile dysfunction (ED), and MetS may be considered a risk factor for ED. The aim of this study was finding an association between metabolic syndrome and hypogonadism in Khouzestan, Iran. Subjects and Methods: In this study, 60 patients divided into two groups consisted of 30 cases (with metabolic syndrome) and 30 controls. Total and free Serum Testosterone and FBS in all of them were measured. Data was analyzed with SPSS20 program. Results: There was a significant difference between two groups about free Testosterone (P=0.01), FBS (P=0.002) and LH (P=0.03). Conclusion: According to this finding, it is thought the prevalence of hypogonadism in men with metabolic syndrome is more than the general population.

Keywords: metabolic syndrome, fasting blood sugar, hypogonadism, testosterone

Procedia PDF Downloads 368
758 Research on the Overall Protection of Historical Cities Based on the 'City Image' in Ancient Maps: Take the Ancient City of Shipu, Zhejiang, China as an Example

Authors: Xiaoya Yi, Yi He, Zhao Lu, Yang Zhang

Abstract:

In the process of rapid urbanization, many historical cities have undergone excessive demolition and construction under the protection and renewal mechanism. The original pattern of the city has been changed, the urban context has been cut off, and historical features have gradually been lost. The historical city gradually changed into the form of decentralization and fragmentation. The understanding of the ancient city includes two levels. The first one refers to the ancient city on the physical space, which defined an ancient city by its historic walls. The second refers to the public perception of the image, which is derived from people's spatial identification of the ancient city. In ancient China, people draw maps to show their way of understanding the city. Starting from ancient maps and exploring the spatial characteristics of traditional Chinese cities from the perspective of urban imagery is a key clue to understanding the spatial characteristics of historical cities on an overall level. The spatial characteristics of the urban image presented by the ancient map are summarized into two levels by typology. The first is the spatial pattern composed of the center, axis and boundary. The second is the space element that contains the city, street, and sign system. Taking the ancient city of Shipu as a typical case, the "city image" in the ancient map is analyzed as a prototype, and it is projected into the current urban space. The research found that after a long period of evolution, the historical spatial pattern of the ancient city has changed from “dominant” to “recessive control”, and the historical spatial elements are non-centralized and fragmented. The wall that serves as the boundary of the ancient city is transformed into “fragmentary remains”, the streets and lanes that serve as the axis of the ancient city are transformed into “structural remains”, and the symbols of the ancient city center are transformed into “site remains”. Based on this, the paper proposed the methods of controlling the protection of land boundaries, the protecting of the streets and lanes, and the selective restoring of the city wall system and the sign system by accurate assessment. In addition, this paper emphasizes the continuity of the ancient city's traditional spatial pattern and attempts to explore a holistic conservation method of the ancient city in the modern context.

Keywords: ancient city protection, ancient maps, Shipu ancient city, urban intention

Procedia PDF Downloads 101
757 Martial Arts and Combative Program of the Philippine Military Academy Cadet Corps Armed Forces of the Philippines: An Assessment

Authors: Jayson Vicente

Abstract:

The young men and women of Philippine Military Academy Cadet Corps Armed Forces of the Philippines (PMA CCAFP) are bred to be front liners and last line of defense during war and times of peace; as such, they must be equipped with the most practical and most effective combat-ready Martial Arts and Combative skills to effectively fulfill their duty, as well as to protect and safeguard themselves to continue serving the people and their country. This study shall assess the current Martial Arts and Combative Program of the PMA CCAFP using descriptive methodology by interviews and floating questionnaires. The current Martial Arts and Combative Program of the PMA CCAFP with all of the subjects involved are more sports inclined rather than combat-equipped. Picking the best from each subject used in the program, this study seeks to recommend improvements or create a better Martial Arts and Combative Program that will satisfy the objective of producing Martial Arts combatant graduates. A good Martial Arts and Combative Program for PMA is essential to prepare them for what lies ahead, which is unforgiving and no rules to pacify threat.

Keywords: combative, martial arts, military, program

Procedia PDF Downloads 126
756 Assessment of Quality of Drinking Water in Residential Houses of Kuwait by Using GIS Method

Authors: Huda Aljabi

Abstract:

The existence of heavy metals similar to cadmium, arsenic, lead and mercury in the drinking water be able to be a threat to public health. The amount of the substances of these heavy metals in drinking water has expected importance. The National Primary Drinking Water Regulations have set limits for the concentrations of these elements in drinking water because of their toxicity. Furthermore, bromate shaped during the disinfection of drinking water by Ozonation can also be a health hazard. The Paper proposed here will concentrate on the compilation of all available data and information on the presence of trace metals and bromate in the drinking water at residential houses distributed over different areas in Kuwait. New data will also be collected through a sampling of drinking water at some of the residential houses present in different areas of Kuwait and their analysis for the contents of trace metals and bromate. The collected data will be presented on maps showing the distribution of these metals and bromate in the drinking water of Kuwait. Correlation among different chemical parameters will also be investigated using the GRAPHER software. This will help both the Ministry of Electricity and Water (MEW) and the Ministry of Health (MOH) in taking corrective measures and also in planning the infrastructure activities for the future.

Keywords: bromate, ozonation, GIS, heavy metals

Procedia PDF Downloads 152
755 Exploring the Use of Discourse Markers by American Male and Female Politicians: A Corpus Based Study

Authors: Gohar Rahman, Rabia Saad Ullah

Abstract:

This research aims to examine the use of discourse markers within the dominion of political speeches, differentiating between genders. The analysis centers on twelve speakers, comprising six males and six females. Speeches selected include commencement, victory, state union addresses, campaigns, and presidential speeches. Halliday and Hasan's cohesion framework, specifically discourse markers, is utilized as a theoretical framework. Data is quantitatively analyzed using AntConc to identify marker frequency. The findings are presented through Excel's tables and graphs, suggesting differences in discourse marker preferences between genders. The findings suggest a divergence in the preferences for discourse markers between males and females. However, asserting that females utilize discourse markers more frequently due to the increased use of filler words, face threat mitigation, and polite speech would be an exaggeration. The disparity in frequency is not substantial, suggesting that males and females exhibit varying language inclinations to some degree.

Keywords: discourse markers, political discourse, gender, speeches, language

Procedia PDF Downloads 38
754 A Critical Discourse Analysis of President Muhammad Buhari's Speeches

Authors: Joy Aworo-Okoroh

Abstract:

Politics is about trust and trust is challenged by the speaker’s ability to manipulate language before the electorate. Critical discourse analysis investigates the role of language in constructing social relationships between a political speaker and his audience. This paper explores the linguistic choices made by President Muhammad Buhari that enshrines his ideologies as well as the socio-political relations of power between him and Nigerians in his speeches. Two speeches of President Buhari –inaugural and Independence Day speeches are analyzed using Norman Fairclough’s perspective on Halliday’s Systemic functional grammar. The analysis is at two levels. The first level of analysis is the identification of transitivity and modality choices in the speeches and how they reveal the covert ideologies. The second analysis is premised on Normal Fairclough’s model, the clauses are analyzed to identify elements of power, hesistation, persuasion, threat and religious statement. It was discovered that Buhari is a dominant character who manipulates the material processes a lot.

Keywords: politics, critical discourse analysis, Norman Fairclough, systemic functional grammar

Procedia PDF Downloads 515
753 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 229
752 A Review on the Potential of Electric Vehicles in Reducing World CO2 Footprints

Authors: S. Alotaibi, S. Omer, Y. Su

Abstract:

The conventional Internal Combustion Engine (ICE) based vehicles are a threat to the environment as they account for a large proportion of the overall greenhouse gas (GHG) emissions in the world. Hence, it is required to replace these vehicles with more environment-friendly vehicles. Electric Vehicles (EVs) are promising technologies which offer both human comfort “noise, pollution” as well as reduced (or no) emissions of GHGs. In this paper, different types of EVs are reviewed and their advantages and disadvantages are identified. It is found that in terms of fuel economy, Plug-in Hybrid EVs (PHEVs) have the best fuel economy, followed by Hybrid EVs (HEVs) and ICE vehicles. Since Battery EVs (BEVs) do not use any fuel, their fuel economy is estimated as price per kilometer. Similarly, in terms of GHG emissions, BEVs are the most environmentally friendly since they do not result in any emissions while HEVs and PHEVs produce less emissions compared to the conventional ICE based vehicles. Fuel Cell EVs (FCEVs) are also zero-emission vehicles, but they have large costs associated with them. Finally, if the electricity is provided by using the renewable energy technologies through grid connection, then BEVs could be considered as zero emission vehicles.

Keywords: electric vehicles, zero emission car, fuel economy, CO₂ footprint

Procedia PDF Downloads 120
751 The Aftermath of Insurgency on Educational Attainment in Nigeria: A Peril on National Development

Authors: David Chapola Nggada

Abstract:

This is a survey designed to find out the impact of the ongoing insurgency in north eastern Nigeria on educational attainment. It is a mixture of both qualitative and quantitative research work on a sample size of 71 secondary school students currently displaced from Baga Biu and Monguno areas of Borno State, now residing as internally displaced persons(IDPs) in Gombe and Yola IDP camps. This was done through both semi structured interview and questionnaire administration. Statistical methods used include percentage and cross tables to gain specific insight into different dimensions of what this implies. Two major aspects of the impact covered were impact on individual student and impact on societal development. These two dimensions were measured against national development variables and analyzed against reviewed literature and findings across the globe. A combination of theories from different fields led to a deeper and better insight. The results confirm a significant relationship between educational attainment and the development of the north east region and Nigeria as a whole. Recommendations were made on ways of reintegrating this group back to the educational system.

Keywords: education, insurgency, national development, threat

Procedia PDF Downloads 222
750 Reconciling the Modern Standard Arabic with the Local Dialects in Writing Literary Texts

Authors: Ahmed M. Ghaleb, Ehab S. Al-Nuzaili

Abstract:

This paper attempts to shed light on the question of the choice between standard Arabic and the vernacular in writing literary texts. Modern Standard Arabic (MSA) has long been the formal language of writing education, administration, and media, shred across the Arab countries. In the mid-20th century, some writers have begun to write their literary works in local dialects claiming that they can be more realistic. On the other hand, other writers have opposed this new trend as it can be a threat to the Standard Arabic or MSA that unify all Arabs. However, some other writers, like Tawfiq al-Hakim, Hamed Damanhouri, Najib Mahfouz, and Hanna Mineh, attempted to solve this problem by using what W. M. Hutchins called a 'hybrid language', a middle language between the standard and the vernacular. It is also termed 'a third language'. The paper attempts to examine some of the literary texts in which a combination of the standard and the colloquial is employed. Thus, the paper attempts to find out a solution by proposing a third language, a form that can combine the MSA and the colloquial, and the possibility of using it in writing literary texts. Therefore, the paper can bridge the gap between the different levels of Arabic.

Keywords: modern standard arabic, dialect or vernacular, diglossia, third language

Procedia PDF Downloads 110
749 An Empirical Study of Determinants Influencing Telemedicine Services Acceptance by Healthcare Professionals: Case of Selected Hospitals in Ghana

Authors: Jonathan Kissi, Baozhen Dai, Wisdom W. K. Pomegbe, Abdul-Basit Kassim

Abstract:

Protecting patient’s digital information is a growing concern for healthcare institutions as people nowadays perpetually live their lives through telemedicine services. These telemedicine services have been confronted with several determinants that hinder their successful implementations, especially in developing countries. Identifying such determinants that influence the acceptance of telemedicine services is also a problem for healthcare professionals. Despite the tremendous increase in telemedicine services, its adoption, and use has been quite slow in some healthcare settings. Generally, it is accepted in today’s globalizing world that the success of telemedicine services relies on users’ satisfaction. Satisfying health professionals and patients are one of the crucial objectives of telemedicine success. This study seeks to investigate the determinants that influence health professionals’ intention to utilize telemedicine services in clinical activities in a sub-Saharan African country in West Africa (Ghana). A hybridized model comprising of health adoption models, including technology acceptance theory, diffusion of innovation theory, and protection of motivation theory, were used to investigate these quandaries. The study was carried out in four government health institutions that apply and regulate telemedicine services in their clinical activities. A structured questionnaire was developed and used for data collection. Purposive and convenience sampling methods were used in the selection of healthcare professionals from different medical fields for the study. The collected data were analyzed based on structural equation modeling (SEM) approach. All selected constructs showed a significant relationship with health professional’s behavioral intention in the direction expected from prior literature including perceived usefulness, perceived ease of use, management strategies, financial sustainability, communication channels, patients security threat, patients privacy risk, self efficacy, actual service use, user satisfaction, and telemedicine services systems securities threat. Surprisingly, user characteristics and response efficacy of health professionals were not significant in the hybridized model. The findings and insights from this research show that health professionals are pragmatic when making choices for technology applications and also their willingness to use telemedicine services. They are, however, anxious about its threats and coping appraisals. The identified significant constructs in the study may help to increase efficiency, quality of services, quality patient care delivery, and satisfactory user satisfaction among healthcare professionals. The implantation and effective utilization of telemedicine services in the selected hospitals will aid as a strategy to eradicate hardships in healthcare services delivery. The service will help attain universal health access coverage to all populace. This study contributes to empirical knowledge by identifying the vital factors influencing health professionals’ behavioral intentions to adopt telemedicine services. The study will also help stakeholders of healthcare to formulate better policies towards telemedicine service usage.

Keywords: telemedicine service, perceived usefulness, perceived ease of use, management strategies, security threats

Procedia PDF Downloads 112
748 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 118
747 Study on Butterfly Visitation Patterns of Stachytarpheta jamaicensis as a Beneficial Plant for Butterfly Conservation

Authors: P. U. S. Peiris

Abstract:

The butterflies are ecologically very important insects. The adults generally feed on nectar and are important as pollinators of flowering plants. However, these pollinators are under threat with their habitat loss. One reason for habitat loss is spread of invasive plants. However, there are even beneficial exotic plants which can directly support for Butterfly Conservation Action Plan of Sri Lanka by attracting butterflies for nectar. Stachytarpheta jamaicensis (L.) is an important nectar plant which attracts a diverse set of butterflies in higher number. It comprises a violet color inflorescence which last for about 37 hours where it attracted a peak of butterflies around 9.00am having around average of 15 butterflies. There were no butterflies in early and late hours where the number goes to very low values as 2 at 1.00pm. it was found that a diverse group of butterflies were attracted from around 15 species including 01 endemic species, 02 endemic subspecies and 02 vulnerable species. Therefore, this is a beneficial exotic plant that could be used in butterfly attraction and conservation however with adequate monitoring of the plant population.

Keywords: butterflies, exotic plants, pollinators, Stachytarpheta jamaicensis (L.)

Procedia PDF Downloads 222
746 Polypropylene Fibres Dyeable with Acid Dyes

Authors: H. M. Wang, C. J. Chang

Abstract:

As the threat of global climate change is more seriously, "net zero emissions by 2050" has become a common global goal. In order to reduce the consumption of petrochemical raw materials and reduce carbon emissions, low-carbon fiber materials have become key materials in the future global textile supply chain. This project uses polyolefin raw materials to modify through synthesis and amination to develop low-temperature dyeable polypropylene fibers, endow them with low-temperature dyeability and high color fastness that can be combined with acid dyes, and improve the problem of low coloring strength. The color fastness to washing can reach the requirement of commerce with 3.5 level or more. Therefore, we realize the entry of polypropylene fiber into the clothing textile supply chain, replace existing fiber raw materials, solve the problem of domestic chemical fiber, textile, and clothing industry's plight of no low-carbon alternative new material sources, and provide the textile industry with a solution to achieve the goal of net zero emissions in 2050.

Keywords: acid dyes, dyeing, low-temperature, polypropylene fiber

Procedia PDF Downloads 66
745 Cultural Landscape Planning – A Case of Chettinad Village Clusters

Authors: Adhithy Menon E., Biju C. A.

Abstract:

In the 1960s, the concept of preserving heritage monuments was first introduced. During the 1990s, the concept of cultural landscapes gained importance, highlighting the importance of culture and heritage. Throughout this paper, we examine the second category of the cultural landscape, which is an organically evolving landscape as it represents a web of tangible, intangible, and ecological heritage and the ways in which they can be rejuvenated. Cultural landscapes in various regions, such as the Chettinad Village clusters, are in serious decline, which is identified through the Heritage Passport program of this area (2007). For this reason, it is necessary to conduct a detailed analysis of the factors that contribute to this degradation to ensure its protection in the future. An analysis of the cultural landscape of the Chettinad Village clusters and its impact on the community is presented in this paper. The paper follows the first objective, which is to understand cultural landscapes and their different criteria and categories. It is preceded by the study of various methods for protecting cultural landscapes. To identify a core area of intervention based on the parameters of Cultural Landscapes and Community Based Tourism, a study and analysis of the regional context of Chettinad village clusters considering tourism development must first be conducted. Lastly, planning interventions for integrating community-based tourism in Chettinad villages for the purpose of rejuvenating the cultural landscapes of the villages as well as their communities. The major findings include the importance of the local community in protecting cultural landscapes. The parameters identified to have an impact on Chettinad Village clusters are a community (community well-being, local maintenance, and enhancement, demand, alternative income for community, public participation, awareness), tourism (location and physical access, journey time, tourist attractions), integrity (natural factors, natural disasters, demolition of structures, deterioration of materials) authenticity (sense of place, living elements, building techniques, artistic expression, religious context) disaster management (natural disasters) and environmental impact (pollution). This area can be restored to its former glory and preserved as part of the cultural landscape for future generations by focusing on and addressing these parameters within the identified core area of the Chettinad Villages cluster (Kanadukathan TP, Kothamangalam, Kottaiyur, Athangudi, Karikudi, and Palathur).

Keywords: Chettinad village clusters, community, cultural landscapes, organically evolved.

Procedia PDF Downloads 51
744 A Comparative Study of Localized Rainfall and Air Pollution between the Urban Area of Sungai Penchala with Sub-Urban and Green Area in Malaysia

Authors: Mohd N. Ahmad, Lariyah Mohd Sidek

Abstract:

The study had shown that Sungai Penchala (urban) was experiencing localized rainfall and hazardous air pollution due to urbanization. The high rainfall that partly added by localized rain had been seen as a threat of causing the flash floods and water quality deterioration in the area. The air pollution that consisted of mainly particulate matter (PM10), carbon monoxide (CO), nitrogen dioxide (NO2), sulfur dioxide (SO2), and ozone (O3) gave an alarming air pollution index (API) to the surrounding area. Comparison among urban area (Sungai Penchala), sub-urban (Gombak), and green areas (Jerantut plus Temerloh) with respect to the rainfall parameters and air pollutants, it was found that the degree of intensities of the parameters was positively related with the urbanization. The air pollutants especially NO2, SO2, and CO were in tandem with the increase of the rainfall. Specifically, if the water catchment area is physically near to the urban area, then the authorities need to look into related urban development program by considering the management of emitted pollutants with respect to the ecological setting of the urban area.

Keywords: urbanization, green area localized rainfall, air pollution, sub-urban area

Procedia PDF Downloads 497
743 New York’s Heat Pump Mandate: Doubling Annual Heating Costs to Achieve a 13% Reduction in New York’s CO₂ Gas Emissions

Authors: William Burdick

Abstract:

Manmade climate change is an existential threat that must be mitigated at the earliest opportunity. The role of government in climate change mitigation is enacting and enforcing law and policy to affect substantial reductions in greenhouse gasses, in the short and long term, without substantial increases in the cost of energy. To be optimally effective those laws and policies must be established and enforced based on peer reviewed evidence and scientific facts and result in substantial outcomes in years, not decades. Over the next fifty years, New York’s 2019 Climate Change and Community Protection Act and 2021 All Electric Building Act that mandate replacing natural gas heating systems with heat pumps will, immediately double annual heating costs and by 2075, yield less than 16.2% reduction in CO₂ emissions from heating systems in new housing units, less than a 13% reduction in total CO₂ emissions, and affect a $40B in cumulative additional heating cost, compared to natural gas fueled heating systems.

Keywords: climate change, mandate, heat pump, natural gas

Procedia PDF Downloads 40
742 Establishment of Gene Pools for Yield Within the Ghanaian Sweetpotato Parental Germplasm

Authors: John Saaka

Abstract:

The increasing world population poses a threat to food security. To meet current and future food demands, sweetpotato stand a good chance because of its recent food security roles. Concerted efforts are needed for both regional and local level varietal development. Heterosis exploiting breeding scheme (HEBS) is one of the options used to improve yield in some crop species and could be a good approach for sweetpotato improvement in Ghana by establishing heterotic gene pools within a population. To achieve this, 22 parental lines were collected from different sources and put in a full diallel arrangement. A total of 149 families, 20 individual cuttings per family, were taken to the field, including ‘checks’ and parental lines for experimentation in a 1m X 0.3m planting order according to the Westcott design. Results from this study led to the characterization of the selected parents into three main heterotic gene pools based on their suitability for use as male, female or both, respectively. This study serves as a baseline for further characterization of the rest of the germplasm in the Ghanaian sweetpotato breeding program.

Keywords: sweetpotato, heterosis, germplasm, food security

Procedia PDF Downloads 42
741 Awareness and Recognition: A Legitimate-Geographic Model for Analyzing the Determinants of Corporate Perceptions of Climate Change Risk

Authors: Seyedmohammad Mousavian, Hanlu Fan, Quingliang Tang

Abstract:

Climate change is emerging as a severe threat to our society, so businesses are expected to take actions to mitigate carbon emissions. However, the actions to be taken depend on managers’ perceptions of climate change risks. Yet, there is scant research on this issue, and understanding of the determinants of corporate perceptions of climate change is extremely limited. The purpose of this study is to close this gap by examining the relationship between perceptions of climate risk and firm-level and country-level factors. In this study, climate change risk captures physical, regulatory, and other risks, and we use data from European companies that participated in CDP from 2010 to 2017. This study reveals those perceptions of climate change risk are significantly positively associated with the environmental, social, and governance score, firm size, and membership in a carbon-intensive sector. In addition, we find that managers in firms operating in a geographic area that is sensitive to the consequences of global warming are more likely to perceive and formally recognize carbon-related risks in their CDP reports.

Keywords: carbon actions, CDP, climate change risk, risk perception

Procedia PDF Downloads 256
740 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 31
739 Histopathological Examination of Lung Surgery Camel in Iran

Authors: Ali Chitgar

Abstract:

Respiratory infections including diseases in camels are important not only because of the threat of animal health but also to reduce their production. Since that deal with respiratory problems and their treatment requires adequate knowledge of the existing respiratory problems, unfortunately, there is limited information about the species of camels. This study aimed to identify lung lesions camels slaughtered in a slaughterhouse more important was performed using histopathology. Respiratory camels (n = 477) was examined after the killing fully and tissue samples were placed in 10% formalin. The samples and histological sections using hematoxylin and eosin staining and color were evaluated. In this study 79.6 % (236 of 477 samples) of the samples was at least a lung lesion. Rate acute interstitial pneumonia, chronic interstitial pneumonia, bronchopneumonia, bronchiolitis, an inflammation of the pleura and 52.8 % respectively atelectasis (236 of 477 samples), 5.4 % (24 of 477 samples), 7.8 % (35 of 477 samples), 6.7 % (30 of 477 samples), 3.4 % (15 of 477 samples) and 15.2% (68 of 477 samples). The lung lesions, acute interstitial pneumonia and bronchopneumonia in autumn winter rather than spring and summer (p <0/05) and as a result, this study showed that high rates of lung lesions in the camel population. Waste higher results in cold seasons (fall and winter) shows.

Keywords: camel, surgery, histopathology, breathing organ

Procedia PDF Downloads 181
738 Reviewing Soil Erosion in Greece

Authors: Paschalis Koutalakis, George N. Zaimes, Valasia Iakovoglou, Konstantinos Ioannou

Abstract:

Mitigating soil erosion, especially in Mediterranean countries such as Greece, is essential in order to maintain environmental and agricultural sustainability. In this paper, scientific publications related to soil erosion studies in Greece were reviewed and categorized. To accomplish this, the online search engine of Scopus was used. The key words were “soil”, “erosion” and “Greece.” An analysis of the published articles was conducted at three levels: i) type of publication, ii) chronologic and iii) thematic. A hundred and ten publications published in scientific journals were reviewed. The results showed that the awareness regarding the soil erosion in Greece has increased only in the last decades. The publications covered a wide range of thematic categories such as the type of studied areas, the physical phenomena that trigger and influence the soil erosion, the negative anthropogenic impacts on them, the assessment tools that were used in order to examine the threat and the proper management. The analysis of these articles was significant and necessary in order to find the scientific gaps of soil erosion studies in Greece and help enhance the sustainability of soil management in the future.

Keywords: climate change, agricultural sustainability, environmental sustainability, soil management

Procedia PDF Downloads 374
737 Level of Behavioral Development for Hepatitis C Virus Cases Versus Their Contacts: Does Infection Make a Difference and What Is Beyond?

Authors: Ammal M. Metwally, Lobna A. ElEtreby, Rehan M. Saleh, Ghada Abdrabou, Somia I. Salama, Amira Orabi, Mohamed Abdelrahman

Abstract:

Hepatitis C virus infection is a public health threat in Egypt. To control infection, efforts should be spent to encourage healthy behavior. This study aimed to assess the level of behavioral development in order to create a positive environment for the adoption of the recommended behaviors. The study was conducted over one year from Jan. 2011 till Jan. 2012. Knowledge, attitude and behavior of 540 HCV patients and 102 of their contacts were assessed and the level of behavioral development was determined. The study revealed that the majority of patients and contacts knew that HCV infection is dangerous with perceived concern for early diagnosis and treatment. More than 75% knew the correct modes of transmission. The assessment showed positive attitudes towards the recommended practices with the intention to adopt those practices. Strategies to create opportunities to continue the recommended behaviors should be adopted together with the reinforcement of social support.

Keywords: hepatitis C virus, level of behavioral development, recommended behaviors

Procedia PDF Downloads 372
736 Encouraging Skills and Entrepreneurial Spirit to Improve Employability of Young Artists

Authors: Olga Lasaga, Carmen Parra

Abstract:

Within the EU 'New Skills for New Jobs' initiative, the art and music sector is considered one of the most vulnerable. Its graduates are faced with the threat of the dole or of not finding work in the sector in which they trained. In this regard, an increasing number of students are graduating every year from European Conservatories and Fine Arts Centres, while the number of job opportunities in this sector has stagnated or decreased. Moreover, the traditional teaching of these institutes does not favour the acquisition of basic skills, such as team building, entrepreneurship, marketing, website design and the design of events, which are among the most important facets of project management and are precisely those aspects that are often most related to the improvement of employability in the art world. To remedy this situation, the results of the European Erasmus+ OMEGA project (Opening More Employment Gates for Art and Music Students) are presented. The OMEGA project aims to increase the employability of art and music students by equipping them with additional skills needed for the search for work. As a result of this project, a manual has been created, a pilot course has been designed and taught, and a comparative study has been conducted on the state of play of the participating countries.

Keywords: artists, employability, entrepreneurship, musicians, skills

Procedia PDF Downloads 218
735 Ecological Planning Method of Reclamation Area Based on Ecological Management of Spartina Alterniflora: A Case Study of Xihu Harbor in Xiangshan County

Authors: Dong Yue, Hua Chen

Abstract:

The study region Xihu Harbor in Xiangshan County, Ningbo City is located in the central coast of Zhejiang Province. Concerning the wave dispating issue, Ningbo government firstly introduced Spartina alterniflora in 1980s. In the 1990s, S. alterniflora spread so rapidly thus a ‘grassland’ in the sea has been created nowadays. It has become the most important invasive plant of China’s coastal tidal flats. Although S. alterniflora had some ecological and economic functions, it has also brought series of hazards. It has ecological hazards on many aspects, including biomass and biodiversity, hydrodynamic force and sedimentation process, nutrient cycling of tidal flat, succession sequence of soil and plants and so on. On engineering, it courses problems of poor drainage and channel blocking. On economy, the hazard mainly reflected in the threat on aquaculture industry. The purpose of this study is to explore an ecological, feasible and economical way to manage Spartina alterniflora and use the land formed by it, taking Xihu Harbor in Xiangshan County as a case. Comparison method, mathematical modeling, qualitative and quantitative analysis are utilized to proceed the study. Main outcomes are as follows. By comparing a series of S. alterniflora managing methods which include the combination of mechanical cutting and hydraulic reclamation, waterlogging, herbicide and biological substitution from three standpoints – ecology, engineering and economy. It is inferred that the combination of mechanical cutting and hydraulic reclamation is among the top rank of S. alternifora managing methods. The combination of mechanical cutting and hydraulic reclamation means using large-scale mechanical equipment like large screw seagoing dredger to excavate the S. alterniflora with root and mud together. Then the mix of mud and grass was blown off nearby coastal tidal zone transported by pipelines, which can cushion the silt of tidal zone to form a land. However, as man-made land by coast, the reclamation area’s ecological sensitivity is quite high and will face high possibility of flood threat. Therefore, the reclamation area has many reasonability requirements, including ones on location, specific scope, water surface rate, direction of main watercourse, site of water-gate, the ratio of ecological land to urban construction land. These requirements all became important basis when the planning was being made. The water system planning, green space system planning, road structure and land use all need to accommodate the ecological requests. Besides, the profits from the formed land is the managing project’s source of funding, so how to utilize land efficiently is another considered point in the planning. It is concluded that by aiming at managing a large area of S. alterniflora, the combination of mechanical cutting and hydraulic reclamation is an ecological, feasible and economical method. The planning of reclamation area should fully respect the natural environment and possible disasters. Then the planning which makes land use efficient, reasonable, ecological will promote the development of the area’s city construction.

Keywords: ecological management, ecological planning method, reclamation area, Spartina alternifora, Xihu harbor

Procedia PDF Downloads 289
734 Investigation of Utilizing L-Band Horn Antenna in Landmine Detection

Authors: Ahmad H. Abdelgwad, Ahmed A. Nashat

Abstract:

Landmine detection is an important and yet challenging problem remains to be solved. Ground Penetrating Radar (GPR) is a powerful and rapidly maturing technology for subsurface threat identification. The detection methodology of GPR depends mainly on the contrast of the dielectric properties of the searched target and its surrounding soil. This contrast produces a partial reflection of the electromagnetic pulses that are being transmitted into the soil and then being collected by the GPR.  One of the most critical hardware components for the performance of GPR is the antenna system. The current paper explores the design and simulation of a pyramidal horn antenna operating at L-band frequencies (1- 2 GHz) to detect a landmine. A prototype model of the GPR system setup is developed to simulate full wave analysis of the electromagnetic fields in different soil types. The contrast in the dielectric permittivity of the landmine and the sandy soil is the most important parameter to be considered for detecting the presence of landmine. L-band horn antenna is proved to be well-versed in the investigation of landmine detection.

Keywords: full wave analysis, ground penetrating radar, horn antenna design, landmine detection

Procedia PDF Downloads 195