Search results for: biodiversity threats
751 The Effect of Street Dust on Urban Environment
Authors: Turki M. Habeebullah, Abdel Hameed A. A. Awad, Said Munir, Atif M. F. Mohammed, Essam A. Morsy, Abdulaziz R. Seroji
Abstract:
Street dust has been knoweldged as an important source of air pollution. It does not remain deposited in a place for long, as it is easily resuspended back into the atmosphere. Street dust is a complex mixture derived from different sources: Deposited dust, traffic, tire, and brake wear, construction and demolition processes. The present study aims to evaluate the elementals ”iron, calcium, lead, cadmium, nickel, silicon, and selenium” and microbial “bacteria and fungi” contents associated street dust at the holy mosque areas. The street dust was collected by sweeping an arera~1m2 along the both sides of the road. The particles with diameter ≤ 1.7 µm constitued the highest percentages of the total particulate ≤45 µm. Moreover, The crustal species: iron and calcium were found in the highest concentrations, and proof that demolition and constricution were the main source of street dust. Also, the low biodiversity of microorganisms is attributed to severe weather conditions and characteristics of the arid environment.Keywords: dust, microbial, environment, street
Procedia PDF Downloads 551750 Economic and Social Well-Being for Migrant Workers: Asian Experiences
Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam
Abstract:
In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.Keywords: Asia, economic well-being, social well-being, migrant workers, human rights
Procedia PDF Downloads 322749 Effects of Drought and Anthropism on Vegetation and Soil Elements in the Steppe of Algeria: Case of the Station of Tadmit (Wilaya of Djelfa)
Authors: L. Benseghir, H. Kadi-Hanifi
Abstract:
Vegetation of the high steppic plains of southern Algiers region has ever been used by human occupation. The harsh climatic context characterized by long periods of drought and an ovine livestock in constant growth lead us to devote a particular attention to the biodiversity of those living environment. The diachronic study made in Tadmit (50 km south of the district of Djelfa) about the specific recording led us to notice that: The floristic recording of Tadmit is not reduced in time but fluctuate, depending on the pasture intensity, the annual rainfall and especially by the protection area of the following two years from January 2004. The forming specific recording of the station undergo significant changes from a period to another. Those changes in floristic list concern nearly 50% of the initial flora that could disappear or be replaced by new species. Finally, the alfa steppe is in a marked decline and is substituted by new facies that were privileged by the overgrazing, stranding or clearance.Keywords: overgrazing, diachronic study, protection area, climate, desertification
Procedia PDF Downloads 267748 Modeling Of The Random Impingement Erosion Due To The Impact Of The Solid Particles
Authors: Siamack A. Shirazi, Farzin Darihaki
Abstract:
Solid particles could be found in many multiphase flows, including transport pipelines and pipe fittings. Such particles interact with the pipe material and cause erosion which threats the integrity of the system. Therefore, predicting the erosion rate is an important factor in the design and the monitor of such systems. Mechanistic models can provide reliable predictions for many conditions while demanding only relatively low computational cost. Mechanistic models utilize a representative particle trajectory to predict the impact characteristics of the majority of the particle impacts that cause maximum erosion rate in the domain. The erosion caused by particle impacts is not only due to the direct impacts but also random impingements. In the present study, an alternative model has been introduced to describe the erosion due to random impingement of particles. The present model provides a realistic trend for erosion with changes in the particle size and particle Stokes number. The present model is examined against the experimental data and CFD simulation results and indicates better agreement with the data incomparison to the available models in the literature.Keywords: erosion, mechanistic modeling, particles, multiphase flow, gas-liquid-solid
Procedia PDF Downloads 167747 The Role of Regional Economic Communities in Fighting Terrorism in Africa: The Case of Inter-Governmental Authority on Development (IGAD)
Authors: Memar Ayalew Demeke, Solomon Gebreyohans Gebru
Abstract:
In Africa, Regional Economic Communities (RECs) were initially established to tackle the economic challenges of the continent. However, overtime, they expanded their mandate to deal with the security threats of the continent such as terrorism. In fact, the fight against terrorism has been internationalized following the September 9/11 terrorist attack in the U.S.A. Since then, RECs have been giving considerable attention to preventing and combating terrorism in their respective regions. Similarly, IGAD has been involved in preventing and combating terrorism. So far, however, little has been done with regard to what IGAD has performed in fighting terrorism. Therefore, this study was intended to describe and analyze the legal and practical activities carried out by IGAD in its fight against terrorism in the region general and in Somalia in particular. Both descriptive and analytical methods were employed and data were analyzed through qualitative approach. Finally, based on the findings, the study argues that, instead of over-reliance on hard power as a means of fighting terrorism, IGAD should invest more on the political and socio-economic problems of its member states so as to address the root causes.Keywords: regional economic communities, IGAD, terrorism, treaties, conventions
Procedia PDF Downloads 426746 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon
Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez
Abstract:
Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.Keywords: biotope mapping, GIS, remote sensing, wetlands
Procedia PDF Downloads 391745 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 283744 Deep Reinforcement Learning and Generative Adversarial Networks Approach to Thwart Intrusions and Adversarial Attacks
Authors: Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica F. Nelson, Sachin S. Shetty
Abstract:
Malicious users exploit vulnerabilities in computer systems, significantly disrupting their performance and revealing the inadequacies of existing protective solutions. Even machine learning-based approaches, designed to ensure reliability, can be compromised by adversarial attacks that undermine their robustness. This paper addresses two critical aspects of enhancing model reliability. First, we focus on improving model performance and robustness against adversarial threats. To achieve this, we propose a strategy by harnessing deep reinforcement learning. Second, we introduce an approach leveraging generative adversarial networks to counter adversarial attacks effectively. Our results demonstrate substantial improvements over previous works in the literature, with classifiers exhibiting enhanced accuracy in classification tasks, even in the presence of adversarial perturbations. These findings underscore the efficacy of the proposed model in mitigating intrusions and adversarial attacks within the machine learning landscape.Keywords: machine learning, reliability, adversarial attacks, deep-reinforcement learning, robustness
Procedia PDF Downloads 4743 Inhibitory Effects of Ambrosia trifida L. on the Development of Root Hairs and Protein Patterns of Radicles
Authors: Ji-Hyon Kil, Kew-Cheol Shim, Kyoung-Ae Park, Kyoungho Kim
Abstract:
Ambrosia trifida L. is designated as invasive alien species by the Act on the Conservation and Use of Biodiversity by the Ministry of Environment, Korea. The purpose of present paper was to investigate the inhibitory effects of aqueous extracts of A.trifida on the development of root hairs of Triticum aestivum L., and Allium tuberosum Rottler ex Spreng and the electrophoretic protein patterns of their radicles. The development of root hairs was inhibited by increasing of aqueous extract concentrations. Through SDS-PAGE, the electrophoretic protein bands of extracted proteins from their radicles were appeared in controls, but protein bands of specific molecular weight disappeared or weakened in treatments. In conclusion, inhibitory effects of A. trifida made two receptor species changed morphologically, and at the molecular level in early growth stage.Keywords: Ambrosia trifida L., invasive alien species, inhibitory effect, root hair, electrophoretic protein, radicle
Procedia PDF Downloads 359742 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing
Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas
Abstract:
This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.Keywords: cyber security, threat intelligence, forensics, heath care
Procedia PDF Downloads 62741 Urban Transport System Resilience Guidelines
Authors: Evangelia Gaitanidou, Evangelos Bekiaris
Abstract:
Considering that resilience implies the ability of a system to adapt continuously in order to respond to its operational goals, a system is considered as more or less resilient depending on the level and time of recovering from disruptive events and/or shocks to its initial state. Regarding transport systems, enhancing resilience is considered imperative for two main reasons: Such systems provide critical support to every socio-economic activity, while being one of the most important economic sectors and, secondly, the paths that convey people, goods and information, are the same through which risks are propagated. RESOLUTE (RESilience management guidelines and Operationalization appLied to Urban Transport Environment) Horizon 2020 research project is answering those needs, by proposing and testing a set of guidelines for resilience management of the urban transport system. The methods and steps towards this goal, through a step-wise methodology, taking into account established models like FRAM (Functional Resonance Analysis Model), and upon gathering existing practices are described in this paper, together with an overview of the produced guidelines. The overall aim is to create a framework which public transport authorities could consult and apply, for rendering their infrastructure resilient against natural disaster and other threats.Keywords: guidelines, infrastructure, resilience, transport
Procedia PDF Downloads 249740 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace
Authors: Da Eun Sung
Abstract:
In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia
Procedia PDF Downloads 319739 Functions and Effects of Green Facades in the Developing Countries: Case Study of Tehran
Authors: S. Jahani, V. Choopankareh
Abstract:
Many people lost their life caused by environmental pollution every year. The negative effects of environmental crises appear to be much higher in Asian countries. The most important environmental issue in the developing countries and especially in Tehran, to our best knowledge, is air pollution that has affected many aspects of life in society. Environmental topics related to technology’s development have been salient issues among the main concerns of designers. Green facades are the most considerable solutions which designers and architectures are focused on, all over the world. But there are lots of behavioral and psychological problems about this point. In this line, this excavation has tried to reveal the cultural and psychological influences of green façade in developing countries like Tehran. Green façades in developing countries are so useless, although they are so expensive. As a matter of fact, users consider green facade as a decorative item. This research is an attempt to recognize the reasons which show green façades as worthless element. Also, some solutions are presented to promote green façades in the developing countries as an intrinsic solution. There are so many environmental threats, especially about air pollution, for a city as Tehran, which might be solved by green facades.Keywords: air pollution, developing countries, effects, green facades
Procedia PDF Downloads 274738 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod
Abstract:
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.Keywords: XML database, trust-based access control, severity-aware, trust values, log file
Procedia PDF Downloads 299737 Phytoplankton Community Composition in Laguna de Terminos, Mexico, and Its Relationship to Environmental Variables
Authors: Enrique Nunez L., Maria Cortes L., Sandra Laffon L., Ana M. Cupul V.
Abstract:
The phytoplankton community composition was studied in a tropical coastal lagoon of Mexico and relationships with environmental variables were evaluated. Six sites inside the tropical Terminos Lagoon were sampled in order to determine abundances and ecological indexes for phytoplankton from May to December 2017. Water samples were also collected to determine the values of pigments, nutrients, and water solids. Results showed that the composition and abundance of the phytoplankton community were influenced by physicochemical factors, nutrients, water solids, and climate seasons. Sixty-six species were identified as potential HAB producers (44.29% from total). However, abundances were not related to the occurrence of HAB during the study. Multidimensional ANOVA indicated no significant differences between sites while some months revealed significant differences. The canonical analysis suggested that environmental variables explained 49% of community variation of potential phytoplankton species producers of HAB.Keywords: phytoplankton, environment, lagoon, biodiversity
Procedia PDF Downloads 137736 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection
Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim
Abstract:
As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).Keywords: intrusion detection, supervised learning, traffic classification, computer networks
Procedia PDF Downloads 348735 Reclamation of Mining Using Vegetation - A Comparative Study of Open Pit Mining
Authors: G. Surendra Babu
Abstract:
We all know the importance of mineral wealth, which has been buried inside the layers of the earth for decades. These are the natural energy sources that are used in our day to day life like fuel, electricity, construction, etc. but the process of extraction causes damage to the nature that can’t be returned back and which are left over after completion of mining we can see these are barren from decades these remain unused degraded land. Most of them are covered with vegetation before the start during mining which damages the native vegetation of the region and disturbs the watershed boundary of the regions and it also disturbs the biodiversity of the reign. The major motto of the study is to understand the various issues that are found and to understand various methods of reclamations process that are suitable for revegetating and also variously practiced which are carried out in the different case studies and government guidelines procedure of lease licenses which includes the environmental clearances and also to study the vegetation pattern according to the major issues identified. And finally suggesting the new guidelines with respect to the old guidelines which helps in the revegetation of the mine-sites which helps in establishing of its own sustainable ecosystem in future.Keywords: reclamation, open-pit mining, revegetation, reclamation methods
Procedia PDF Downloads 190734 The Correlation Between the Rise of China and the US-Iranian Conflict: An American Perspective
Authors: Ranj Tofik
Abstract:
This article aims to demonstrate a link and/or correlation between the rise of China and the US-Iranian conflict, from a US point of view. To demonstrate this link, the article relies on the content analysis method by analyzing American reports and official data. This article concludes that this correlation indicates that the more China rises and the greater the Chinese threat to America, the more changes will occur in the US-Iranian conflict and the US actions regarding this conflict will increase – in the form of imposing sanctions and using means of pressure on Iran, or trying to reach an agreement and settlement with Iran. This article, via noting and observing that correlation, also claims that before 2012, Iran was a regional threat to US interests in the Middle East. However, after 2012 when the rise of China became one of the major threats to America, Iran, because of its rapprochement with China, became also part of the Chinese threat, which is a threat to America's global standing. In addition, observing this correlation indicates the possibility that the rise of China and its threat to the USA has become one of the main drivers in the US-Iranian conflict. Consequently, it can be said that Iran has become a vital issue in the US-China rivalry, as it has become an appropriate gateway for China to enter the Middle East and undermine US hegemony there.Keywords: China-Iran relations, China's rise, JCPOA, US-Chinese competition, US-Iranian conflict
Procedia PDF Downloads 99733 A Study on Aquatic Bycatch Mortality Estimation Due to Prawn Seed Collection and Alteration of Collection Method through Sustainable Practices in Selected Areas of Sundarban Biosphere Reserve (SBR), India
Authors: Samrat Paul, Satyajit Pahari, Krishnendu Basak, Amitava Roy
Abstract:
Fishing is one of the pivotal livelihood activities, especially in developing countries. Today it is considered an important occupation for human society from the era of human settlement began. In simple terms, non-target catches of any species during fishing can be considered as ‘bycatch,’ and fishing bycatch is neither a new fishery management issue nor a new problem. Sundarban is one of the world’s largest mangrove land expanding up to 10,200 sq. km in India and Bangladesh. This largest mangrove biome resource is used by the local inhabitants commercially to run their livelihood, especially by forest fringe villagers (FFVs). In Sundarban, over-fishing, especially post larvae collection of wild Penaeus monodon, is one of the major concerns, as during the collection of P. monodon, different aquatic species are destroyed as a result of bycatch mortality which changes in productivity and may negatively impact entire biodiversity, of the ecosystem. Wild prawn seed collection gear like a small mesh sized net poses a serious threat to aquatic stocks, where the collection isn’t only limited to prawn seed larvae. As prawn seed collection processes are inexpensive, require less monetary investment, and are lucrative; people are easily engaged here as their source of income. Wildlife Trust of India’s (WTI) intervention in selected forest fringe villages of Sundarban Tiger Reserve (STR) was to estimate and reduce the mortality of aquatic bycatches by involving local communities in newly developed release method and their time engagement in prawn seed collection (PSC) by involving them in Alternate Income Generation (AIG). The study was conducted for their taxonomic identification during the period of March to October 2019. Collected samples were preserved in 70% ethyl alcohol for identification, and all the preserved bycatch samples were identified morphologically by the expertise of the Zoological Survey of India (ZSI), Kolkata. Around 74 different aquatic species, where 11 different species are molluscs, 41 fish species, out of which 31 species were identified, and 22 species of crustacean collected, out of which 18 species were identified. Around 13 different species belong to a different order, and families were unable to identify them morphologically as they were collected in the juvenile stage. The study reveals that for collecting one single prawn seed, eight individual life of associated faunas are being lost. Zero bycatch mortality is not practical; rather, collectors should focus on bycatch reduction by avoiding capturing, allowing escaping, and mortality reduction, and must make changes in their fishing method by increasing net mesh size, which will avoid non-target captures. But as the prawns are small in size (generally 1-1.5 inches in length), thus increase net size making economically less or no profit for collectors if they do so. In this case, returning bycatches is considered one of the best ways to a reduction in bycatch mortality which is a more sustainable practice.Keywords: bycatch mortality, biodiversity, mangrove biome resource, sustainable practice, Alternate Income Generation (AIG)
Procedia PDF Downloads 149732 Application of Lean Manufacturing Tools in Hot Asphalt Production
Authors: S. Bayona, J. Nunez, D. Paez, C. Diaz
Abstract:
The application of Lean manufacturing tools continues to be an effective solution for increasing productivity, reducing costs and eliminating waste in the manufacture of goods and services. This article analyzes the production process of a hot asphalt manufacturing company from an administrative and technical perspective. Three main phases were analyzed, the first phase was related to the determination of the risk priority number of the main operations in asphalt mix production process by an FMEA (Failure Mode Effects Analysis), in the second phase the Value Stream Mapping (VSM) of the production line was performed and in the third phase a SWOT (Strengths, Weaknesses Opportunities, Threats) matrix was constructed. Among the most valued failure modes were the lack training of workers in occupational safety and health issues, the lack of signaling and classification of granulated material, and the overweight of vehicles loaded. The analysis of the results in the three phases agree on the importance of training operational workers, improve communication with external actors in order to minimize delays in material orders and strengthen control suppliers.Keywords: asphalt, lean manufacturing, productivity, process
Procedia PDF Downloads 113731 Cultivating Responsible AI: For Cultural Heritage Preservation in India
Authors: Varsha Rainson
Abstract:
Artificial intelligence (AI) has great potential and can be used as a powerful tool of application in various domains and sectors. But with the application of AI, there comes a wide spectrum of concerns around bias, accountability, transparency, and privacy. Hence, there is a need for responsible AI, which can uphold ethical and accountable practices to ensure that things are transparent and fair. The paper is a combination of AI and cultural heritage preservation, with a greater focus on India because of the rich cultural legacy that it holds. India’s cultural heritage in itself contributes to its identity and the economy. In this paper, along with discussing the impact culture holds on the Indian economy, we will discuss the threats that the cultural heritage is exposed to due to pollution, climate change and urbanization. Furthermore, the paper reviews some of the exciting applications of AI in cultural heritage preservation, such as 3-D scanning, photogrammetry, and other techniques which have led to the reconstruction of cultural artifacts and sites. The paper eventually moves into the potential risks and challenges that AI poses in cultural heritage preservation. These include ethical, legal, and social issues which are to be addressed by organizations and government authorities. Overall, the paper strongly argues the need for responsible AI and the important role it can play in preserving India’s cultural heritage while holding importance to value and diversity.Keywords: responsible AI, cultural heritage, artificial intelligence, biases, transparency
Procedia PDF Downloads 181730 Checklist of Odonata of Shasha Forest Reserve, Ife Southern, Osun State, Nigeria
Authors: Ehikhamele Isaac Erhomosele, Ogbogu Sunday Sylvester
Abstract:
A biodiversity survey was conducted in Shasha Forest Reserve, Ife southern, Osun State, Nigeria between May 2019 to April 2021 with a view to determining the nature of Odonata fauna of the forest. A total number of 1055 individuals of adult dragonflies and damselflies belonging to 8 families (Aeshnidae, Calopterygidae, Chlorocyphidae, Coenagrionidae, Gomphidae, Lestidae, Libellulidae and Platycnemididae) were recorded. Five (5) of these families of which belong to the suborder Zygoptera, and the remaining three (3) to Anisoptera. Libellulidae was the most abundant family while Gomphidae recorded the least representative. No new species of Odonata was recorded. Most of the families reported were previously been documented in the tropical region. Logging activities and human disturbance have been attributed to the nature of Odonata species in the Forest. It is therefore recommended that logging should be restricted to designated areas of the forest and regulated by the Department of Forestry of Osun State Ministry of Agriculture and Natural Resources in conjunction with the Federal Ministry of Environment.Keywords: checklist, Odonata, Shasha, families
Procedia PDF Downloads 114729 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance
Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle
Abstract:
Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model
Procedia PDF Downloads 101728 The Indigenous Forced Migration in Mato Grosso in Pedro Casaldaliga's Poetic
Authors: Eliziane Navarro
Abstract:
It is intended, in this study, from some poems from the work of the poet and Bishop of Sao Felix do Araguaia-MT Brazil Dom Pedro Casaldaliga, to analyze his poetics from the perspective of the environmental law. In his work, Casaldaliga made a considerable manifest against the oppression experienced especially by Xavante people inside the countryside of the state of Mato Grosso when some government programs benefited a large number of landowners in instead of that minority as a power and control self-affirmation process. The attention which Casaldaliga dismissed to the cause of indigenous eviction of their land called Maraiwatsede resulted in numerous death threats against the poet who was not silenced in the face of the landowners’ grievances. His voice contributed significantly to the process of land returning to the indigenous people. Because of the international pressure, the Italian company AGIP, owner of the land, tried to return it to the hands of the indigenous, unfortunately, in the middle of the process, the land was occupied by politicians and big landowners of the region. Another objective of this research is to check the connection of his testimonial literature with the actual legal context of the state in the 50s and also to analyze his poetry as a complaint that led the cause of the state's indigenous to the Eco 92 discussion in Rio de Janeiro.Keywords: law and literature, indigenous migration, Mato Grosso, Pedro Casaldaliga
Procedia PDF Downloads 243727 Eco-Friendly Cultivation
Authors: Shah Rucksana Akhter Urme
Abstract:
Agriculture is the main source of food for human consumption and feeding the world huge population, the pressure of food supply is increasing day by day. Undoubtedly, quality strain, improved plantation, farming technology, synthetic fertilizer, readily available irrigation, insecticides and harvesting technology are the main factors those to meet up the huge demand of food consumption all over the world. However, depended on this limited resources and excess amount of consuming lands, water, fertilizers leads to the end of the resources and severe climate effects has been left for our future generation. Agriculture is the most responsible to global warming, emitting more greenhouse gases than all other vehicles largely from nitrous oxide released by from fertilized fields, and carbon dioxide from the cutting of rain forests to grow crops . Farming is the thirstiest user of our precious water supplies and a major polluter, as runoff from fertilizers disrupts fragile lakes, rivers, and coastal ecosystems across the globe which accelerates the loss of biodiversity, crucial habitat and a major driver of wildlife extinction. It is needless to say that we have to more concern on how we can save the nutrients of the soil, storage of the water and avoid excessive depends on synthetic fertilizer and insecticides. In this case, eco- friendly cultivation could be a potential alternative solution to minimize effects of agriculture in our environment. The objective of this review paper is about organic cultivation following in particular biotechnological process focused on bio-fertilizer and bio-pesticides. Intense practice of chemical pesticides, insecticides has severe effect on both in human life and biodiversity. This cultivation process introduces farmer an alternative way which is nonhazardous, cost effective and ecofriendly. Organic fertilizer such as tea residue, ashes might be the best alternative to synthetic fertilizer those play important role in increasing soil nutrient and fertility. Ashes contain different essential and non-essential mineral contents that are required for plant growth. Organic pesticide such as neem spray is beneficial for crop as it is toxic for pest and insects. Recycled and composted crop wastes and animal manures, crop rotation, green manures and legumes etc. are suitable for soil fertility which is free from hazardous chemicals practice. Finally water hyacinth and algae are potential source of nutrients even alternative to soil for cultivation along with storage of water for continuous supply. Inorganic practice of agriculture, consuming fruits and vegetables becomes a threat for both human life and eco-system and synthetic fertilizer and pesticides are responsible for it. Farmers that practice eco-friendly farming have to implement steps to protect the environment, particularly by severely limiting the use of pesticides and avoiding the use of synthetic chemical fertilizers, which are necessary for organic systems to experience reduced environmental harm and health risk.Keywords: organic farming, biopesticides, organic nutrients, water storage, global warming
Procedia PDF Downloads 56726 Aquatic and Marshy Flora from Fresh Water Wetlands on Quartz Sands in Pinar Del Río, Cuba
Authors: Vidal Pérez Hernández, Enrique González Pendás
Abstract:
The most of the aquatic and marshy flora in Cuba, is located on quartzitic sands ecosystems and they are represented by a wide variety of freshwater wetlands, which are spread in the whole south and south-western plain of Pinar del Río. The survey carried out in these ecosystems offers an updated inventory of these species, showing up their biological type, habit, distribution, and the threat grade to which are subjected, taking into account categories granted by UICN. A remarkable decrease is evidenced, in the total of these species respect to this area; due to deposit processes and deforestation, which are taken place by the human activity and the climatic change. It is linked to others threats like, limitless use of their water reserves for irrigating groves, the cattle raising and intensive fishing. Added to it, its sand with 99% pure crystal quartz, are used for the mining. The combination of all factors has a negative influence on a flora that stores more than 250 species, most of them herbaceous and hydrophytes. In these particular ecosystems were found a 40% endemism from total flora, and more than 80%, are evaluated inside the most sensitive threat categories, and already some of them have been declared as extinct.Keywords: aquatic flora, marshy flora, quartzitic sands, wetlands
Procedia PDF Downloads 226725 Antibacterial Activity of Libyan Seaweed Extracts
Authors: Salmin K. Alshalmani, Nada H. Zobi, Ismaeel H. Bozakouk
Abstract:
Marine organisms are potentially prolific sources of highly bio active secondary metabolites that might represent useful leads in the development of new pharmaceutical agents. The Libyan marine biodiversity including macroalgae remains partially unexplored in term of their potential bio activities. The phytochemical analysis of the alcoholic extracts of some commonly occurring seaweed Cystoseira compressa, enteromorpha intestinals, corallina, and Ulva lactuca and their evaluated for antibacterial activity by well diffusion assay were studied. Four different solvents namely water, ethanol 99 %, methanol 99 %, and methylated spirit 95 % were used for extraction. The phytochemical analysis revealed the presence of carbohydrates, steroids, tannin & phenols, saponins, proteins, and glycosides. The extracts were subjected for study of antibacterial activity. The zone of inhibition ranged between 8 to 16 mm in aqueous extract and up to 16 mm in methanol extract. The maximum activity (16 mm) was recorded from methanol extract of Ulva lactuca against Staphylococcus aureus and, minimum activity (8mm) recorded by Cystoseira compressa against S. aureus.Keywords: macroalgae, phytochemicals, antibacterial activity, methanolic extract
Procedia PDF Downloads 465724 Authorship Profiling of Unidentified Corpora in Saudi Social Media
Authors: Abdulaziz Fageeh
Abstract:
In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context.Keywords: authorship profiling, arabic linguistics, saudi social media, cybercrime, financial blackmail, linguistic features, forensic linguistics, online threats
Procedia PDF Downloads 8723 Green Walls and Living Facades: The Portuguese Experience
Authors: Andreia Cortes, Carla Pimentel-Rodrigues, Joao Almeida, Myriam Kanoun-Boule, Carla Carvalho, Antonio Tadeu, Armando Silva-Afonso
Abstract:
The adoption of green infrastructure is nowadays encouraged as an essential measure of urban planning and territorial development whenever it offers a better alternative, or is complementary, to current solutions. Green walls and living facades often provide healthy alternatives to traditional grey infrastructures, offering many benefits for both citizens and cities. Beyond the ability to improve environmental conditions and quality of life, they can augment the energy efficiency of buildings, enhance biodiversity and deliver a range of ecosystem services such as water purification, reduction of the urban heat island effect, improvement of air quality and climate change adaptation. For this communication, a systematic survey of the existing green walls and living facades in Portugal was carried out. Different systems were analyzed and compared in terms of dimensions, constructive solutions, vegetative species, maintenance necessities and environmental aspects.Keywords: green buildings, green walls, living facades, sustainability construction
Procedia PDF Downloads 423722 Protecting the Privacy and Trust of VIP Users on Social Network Sites
Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi
Abstract:
There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.Keywords: social network sites, online social network, privacy, trust, security and authentication
Procedia PDF Downloads 380